{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:38Z","timestamp":1750307018237,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,6,4]],"date-time":"2012-06-04T00:00:00Z","timestamp":1338768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["NSF-0852688NSF-0534877"],"award-info":[{"award-number":["NSF-0852688NSF-0534877"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,4]]},"DOI":"10.1145\/2307729.2307738","type":"proceedings-article","created":{"date-parts":[[2012,6,27]],"date-time":"2012-06-27T13:31:21Z","timestamp":1340803881000},"page":"49-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Architectural patterns of U.S. public safety networks"],"prefix":"10.1145","author":[{"given":"Steve","family":"Sawyer","sequence":"first","affiliation":[{"name":"Syracuse University"}]},{"given":"Robert","family":"Schrier","sequence":"additional","affiliation":[{"name":"Polaris Library Systems"}]},{"given":"Jane","family":"Fedorowicz","sequence":"additional","affiliation":[{"name":"Bentley University"}]},{"given":"Martin","family":"Dias","sequence":"additional","affiliation":[{"name":"Northeastern University"}]},{"given":"Christine","family":"Williams","sequence":"additional","affiliation":[{"name":"Bentley University"}]},{"given":"Mike","family":"Tyworth","sequence":"additional","affiliation":[{"name":"Penn State University"}]}],"member":"320","published-online":{"date-parts":[[2012,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Enterprise Architecture An introduction.","author":"Anderson P.","year":"2008","unstructured":"Anderson , P. & Backhouse G. ( 2008 ). Enterprise Architecture An introduction. Retrieved from www.jisc.ac.uk\/publications Anderson, P. & Backhouse G. (2008). Enterprise Architecture An introduction. Retrieved from www.jisc.ac.uk\/publications"},{"key":"e_1_3_2_1_2_1","volume-title":"IT architecture: Cutting costs and complexity. McKinsey Quarterly","author":"Akella J., H.","year":"2009","unstructured":"Akella , J., H. Buckow and S. Rey ( 2009 ). IT architecture: Cutting costs and complexity. McKinsey Quarterly . McKinsey & Company . Retrieved from http:\/\/www.mckinseyquarterly.com\/IT_architecture_Cutting_costs_and_complexity_2391 Akella, J., H. Buckow and S. Rey (2009). IT architecture: Cutting costs and complexity. McKinsey Quarterly. McKinsey & Company. Retrieved from http:\/\/www.mckinseyquarterly.com\/IT_architecture_Cutting_costs_and_complexity_2391"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2007.12.016"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593840710758031"},{"key":"e_1_3_2_1_5_1","volume-title":"Strategic alignment: a process model For integrating information technology and business strategies. {Sloan working paper}","author":"Henderson J. C.","year":"1989","unstructured":"Henderson , J. C. and Venkatraman , N . ( 1989 ). Strategic alignment: a process model For integrating information technology and business strategies. {Sloan working paper} . Massachusetts Institute of Technology , Cambridge, MA . Henderson, J. C. and Venkatraman, N. (1989). Strategic alignment: a process model For integrating information technology and business strategies. {Sloan working paper}. Massachusetts Institute of Technology, Cambridge, MA."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.382.0472"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1108\/17506160710839169"},{"key":"e_1_3_2_1_8_1","volume-title":"T","author":"Hoffer J.","year":"2009","unstructured":"Hoffer , J. , Prescott , M. , Heikki , T . ( 9 th Ed.) ( 2009 ). Modern Database Management . Saddle River, NJ : Pearson Prentice Hall . Hoffer, J., Prescott, M., Heikki, T. (9th Ed.) (2009). Modern Database Management. Saddle River, NJ: Pearson Prentice Hall.","edition":"9"},{"key":"e_1_3_2_1_9_1","volume-title":"Criteria for Statewide Interoperability Strategic Plans.","author":"Homeland Security","year":"2007","unstructured":"Homeland Security ( 2007 ). Criteria for Statewide Interoperability Strategic Plans. Retrieved from http:\/\/www.safecomprogram.gov\/library\/lists\/library\/DispForm.aspx?ID=87 Homeland Security (2007). Criteria for Statewide Interoperability Strategic Plans. Retrieved from http:\/\/www.safecomprogram.gov\/library\/lists\/library\/DispForm.aspx?ID=87"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.433.0587"},{"key":"e_1_3_2_1_11_1","volume-title":"Building Better Causal Theories: A Fuzzy Set Approach to Typologies in Organization Research","author":"Fiss C.","year":"2011","unstructured":"Fiss , C. ( 2011 ). Building Better Causal Theories: A Fuzzy Set Approach to Typologies in Organization Research . Fiss, C. (2011). Building Better Causal Theories: A Fuzzy Set Approach to Typologies in Organization Research."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.59"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1108\/17410390510623981"},{"key":"e_1_3_2_1_14_1","volume-title":"Work: Modeling, Communication and Analysis.","author":"Lankhorst","year":"2005","unstructured":"Lankhorst et al. ( 2005 ). Enterprise Architecture at Work: Modeling, Communication and Analysis. Berlin : Springer-Verlag and Heidelerg GmbH& Co. ISBN :9783540243717 Lankhorst et al. (2005). Enterprise Architecture at Work: Modeling, Communication and Analysis. Berlin: Springer-Verlag and Heidelerg GmbH& Co. ISBN:9783540243717"},{"key":"e_1_3_2_1_15_1","volume-title":"Interoperable Communications Technical Assistance Program.","author":"Los Alamos National Laboratory","year":"2009","unstructured":"Los Alamos National Laboratory ( 2009 ). Interoperable Communications Technical Assistance Program. Retrieved from https:\/\/www.rkb.us\/contentdetail.cfm?content_id=157265 Los Alamos National Laboratory (2009). Interoperable Communications Technical Assistance Program. Retrieved from https:\/\/www.rkb.us\/contentdetail.cfm?content_id=157265"},{"key":"e_1_3_2_1_16_1","volume-title":"The Open Group Architecture Framework (TOGAF),Version 7.0","author":"Open Group","year":"2001","unstructured":"Open Group ( 2001 ). The Open Group Architecture Framework (TOGAF),Version 7.0 , The Open Group . Retrieved from: http:\/\/www.opengroup.org\/architecture\/togaf7\/presents\/togaf_ovu.pdf Open Group (2001). The Open Group Architecture Framework (TOGAF),Version 7.0, The Open Group. Retrieved from: http:\/\/www.opengroup.org\/architecture\/togaf7\/presents\/togaf_ovu.pdf"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0147-8001(77)90006-7"},{"key":"e_1_3_2_1_18_1","volume-title":"From Fuzzy Sets to Crisp Truth Tables. Working Paper.","author":"Ragin C.","year":"2005","unstructured":"Ragin , C. ( 2005 ). From Fuzzy Sets to Crisp Truth Tables. Working Paper. Retrieved from http:\/\/www.compasss.org\/files\/WPfiles\/Raginfztt_April05.pdf. Ragin, C. (2005). From Fuzzy Sets to Crisp Truth Tables. Working Paper. Retrieved from http:\/\/www.compasss.org\/files\/WPfiles\/Raginfztt_April05.pdf."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Ragin C. (2006). Set Relations in Social Research: Evaluating their consistency and coverage. Political Analysis. {Advance Access Publication}. Retrieved from: http:\/\/www.u.arizona.edu\/~cragin\/fsQCA\/download\/Con_cov.pdf  Ragin C. (2006). Set Relations in Social Research: Evaluating their consistency and coverage. Political Analysis. {Advance Access Publication}. Retrieved from: http:\/\/www.u.arizona.edu\/~cragin\/fsQCA\/download\/Con_cov.pdf","DOI":"10.1093\/pan\/mpj019"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","DOI":"10.7208\/chicago\/9780226702797.001.0001","volume-title":"Redesigning Social Inquiry: Fuzzy Sets and Beyond","author":"Ragin C.","year":"2008","unstructured":"Ragin , C. ( 2008 ). Redesigning Social Inquiry: Fuzzy Sets and Beyond . Chicago : University of Chicago Press. Ragin, C. (2008). Redesigning Social Inquiry: Fuzzy Sets and Beyond. Chicago: University of Chicago Press."},{"key":"e_1_3_2_1_21_1","volume-title":"Configurational Comparative Methods: Qualitative Comparative Analysis and related techniques","author":"Ragin C.","year":"2009","unstructured":"Ragin , C. & Rihoux , B. ( 2009 ). Configurational Comparative Methods: Qualitative Comparative Analysis and related techniques . California : Sage Publications . Ragin, C. & Rihoux, B. (2009). Configurational Comparative Methods: Qualitative Comparative Analysis and related techniques. California: Sage Publications."},{"key":"e_1_3_2_1_22_1","volume-title":"17 Mar, 2009.","author":"Sawyer S.","year":"2009","unstructured":"Sawyer , S. ( 2009 ). PSN Architecture {PowerPoint Slides}. Presentation given at PSN PI-meeting , 17 Mar, 2009. Sawyer, S. (2009). PSN Architecture {PowerPoint Slides}. Presentation given at PSN PI-meeting, 17 Mar, 2009."},{"key":"e_1_3_2_1_23_1","volume-title":"Typologies in Public Safety Networks","author":"Sawyer S.","year":"2011","unstructured":"Sawyer , S. , Schrier , R. ( 2011 ). Typologies in Public Safety Networks , Syracuse University , School of Information Studies Working Paper, Syracuse, NY. Sawyer, S., Schrier, R. (2011). Typologies in Public Safety Networks, Syracuse University, School of Information Studies Working Paper, Syracuse, NY."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.313.0590"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1080.0206"},{"key":"e_1_3_2_1_26_1","volume-title":"U. S. Department of Homeland Security Launches Office of Interoperability and Compatibility","author":"Tighe D.","year":"2004","unstructured":"Tighe , D. ( 2004 ). U. S. Department of Homeland Security Launches Office of Interoperability and Compatibility ; Offers States and Locales Tools for Improving Public Safety Communications Interoperability. Retrieved from http:\/\/www.dhs.gov\/xnews\/releases\/press_release_0530.shtm Tighe, D. (2004). U. S. Department of Homeland Security Launches Office of Interoperability and Compatibility; Offers States and Locales Tools for Improving Public Safety Communications Interoperability. Retrieved from http:\/\/www.dhs.gov\/xnews\/releases\/press_release_0530.shtm"},{"key":"e_1_3_2_1_27_1","volume-title":"Managing change through enterprise architecture, enterprise Architecture strategies","author":"Westbrock T.","year":"1999","unstructured":"Westbrock T. ( 1999 ). Managing change through enterprise architecture, enterprise Architecture strategies . Meta Group Practice Paper . Westbrock T. (1999). Managing change through enterprise architecture, enterprise Architecture strategies. Meta Group Practice Paper."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1551593.1551599"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1809874.1809881"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.263.0276"}],"event":{"name":"dg.o '12: 13th Annual International Conference on Digital Government Research","sponsor":["Elsevier","iSchool College of Information Studies, University of Maryland","iPAC Information Policy and Access Center"],"location":"College Park Maryland USA","acronym":"dg.o '12"},"container-title":["Proceedings of the 13th Annual International Conference on Digital Government Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2307729.2307738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2307729.2307738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:49:10Z","timestamp":1750236550000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2307729.2307738"}},"subtitle":["a fuzzy set qualitative comparison analysis"],"short-title":[],"issued":{"date-parts":[[2012,6,4]]},"references-count":30,"alternative-id":["10.1145\/2307729.2307738","10.1145\/2307729"],"URL":"https:\/\/doi.org\/10.1145\/2307729.2307738","relation":{},"subject":[],"published":{"date-parts":[[2012,6,4]]},"assertion":[{"value":"2012-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}