{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T13:48:12Z","timestamp":1767016092317,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/ict-dm47966.2019.9032967","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T04:52:36Z","timestamp":1584075156000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["CBRNe and vulnerable citizens: co-creating an app for that"],"prefix":"10.1109","author":[{"given":"Laura","family":"Petersen","sequence":"first","affiliation":[]},{"given":"Grigore","family":"Havarneanu","sequence":"additional","affiliation":[]},{"given":"Garik","family":"Markarian","sequence":"additional","affiliation":[]},{"given":"Natasha","family":"McCroneline","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11069-014-1512-x"},{"key":"ref11","article-title":"NEXES user requirements, needs and gaps","author":"pylvas","year":"2018","journal-title":"EU H2020 project NEXES deliverable D2 3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-13-23"},{"key":"ref13","article-title":"Ebola: a big data disaster - privacy, property, and the law of disaster experimentation","author":"mcdonald","year":"2016","journal-title":"The Centre for Internet and Society CIS 2016 01"},{"key":"ref14","first-page":"1","article-title":"Security and privacy issues related to the use of mobile health apps","author":"adhikari","year":"2014","journal-title":"25th Australasian Conference on Information Systems (ACIS 2014) Schulke 2013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/1468-5973.12142"},{"key":"ref16","article-title":"International Organizations and the EU General Data Protection Regulation","author":"kuner","year":"0","journal-title":"University of Cambridge Faculty of Law Research Paper No 20\/2018"},{"key":"ref17","article-title":"Handbook on data protection in humanitarian action","author":"kuner","year":"2017","journal-title":"Geneva International Committee of the Red Cross"},{"key":"ref18","first-page":"1","article-title":"Enhanced 911 technology and privacy concerns: how has the balance changed since Setpember 11?","volume":"1","author":"futsch","year":"2001","journal-title":"Duke Law & Technology Review"},{"key":"ref19","article-title":"Les technologies smartphone comme outils d'aide &#x00E0; l'alerte face aux crues rapides en France","author":"kouadio","year":"2016","journal-title":"Univerit&#x00E9; d'Avignon et des Pays du Vaucluse France"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11069-016-2550-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2016.01.027"},{"key":"ref6","article-title":"Efficiently allocating safety tips after an earthquake - lessons learned from the smartphone application LastQuake","author":"fallou","year":"2019","journal-title":"Proceedings of the 16th ISCRAM Conference - Val&#x00E8;ncia"},{"key":"ref5","article-title":"Alerter la population face aux crues rapides en France: compr&#x00E9;hension et &#x00E9;valuation d'un processus en mutation","author":"douvinet","year":"2018","journal-title":"Universit&#x00E9; d'Avignon"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/j.0272-4332.2004.00433.x"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.00053"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijdrr.2017.06.009"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/S1049023X15005099"},{"journal-title":"Google Play Store","year":"0","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0089846"},{"journal-title":"Brussels 18 10 2017 COM(2017) 610 final","article-title":"Action Plan to enhance preparedness against chemical, biological, radiological and nuclear security risks","year":"0","key":"ref22"},{"key":"ref21","article-title":"Empirical evidence and analysis of the human behaviour data collection activities","author":"krieger","year":"0","journal-title":"EU FP7 project PRACTICE deliverable D8 15 Analystical Report"},{"journal-title":"Case Method Fast-Track A RAD Approach","year":"1994","author":"clegg","key":"ref23"}],"event":{"name":"2019 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)","start":{"date-parts":[[2019,12,18]]},"location":"Paris, France","end":{"date-parts":[[2019,12,20]]}},"container-title":["2019 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9018169\/9032888\/09032967.pdf?arnumber=9032967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:52:59Z","timestamp":1658155979000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9032967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ict-dm47966.2019.9032967","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}