{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T08:40:08Z","timestamp":1744792808677,"version":"3.40.4"},"reference-count":33,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003495","name":"Hessisches Ministerium f\u00fcr Wissenschaft und Kunst","doi-asserted-by":"publisher","award":["ATHENE"],"award-info":[{"award-number":["ATHENE"]}],"id":[{"id":"10.13039\/501100003495","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["ATHENE"],"award-info":[{"award-number":["ATHENE"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/dx.doi.org\/10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["236615297","521584557"],"award-info":[{"award-number":["236615297","521584557"]}],"id":[{"id":"10.13039\/dx.doi.org\/10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,16]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Local disasters such as the Ahr Valley flood in Germany, the international backdrop of the Russo-Ukrainian War, or the global impact of the COVID-19 pandemic place high demands on the people and organisations that are involved in these situations and contexts to save lives, mitigate damage, provide comfort, or organise reconstruction. Novel technologies are constantly making their way into everyday life, such as artificial intelligence, big data, decentralised networks, internet of things, or virtual reality. Their adaptation, acceptance, usability, usefulness, and legal framework conditions for safety-critical systems must be researched and tested thoroughly. In this special issue, we investigate the use of computer-based solutions in areas and situations of direct relevance to people\u2019s lives and well-being (Usable Safety), as well as contributions to user-oriented resilience concepts of sociotechnical systems concerning potential attacks (Usable Security) and data protection mechanisms (Usable Privacy).<\/jats:p>","DOI":"10.1515\/icom-2025-0009","type":"journal-article","created":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T17:06:04Z","timestamp":1743181564000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["The tension of usable safety, security and privacy"],"prefix":"10.1515","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0387-9597","authenticated-orcid":false,"given":"Marc-Andr\u00e9","family":"Kaufhold","sequence":"first","affiliation":[{"name":"Knowledge Engineering (KE) , 26536 Technical University of Darmstadt , Darmstadt , Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8138-6536","authenticated-orcid":false,"given":"Tilo","family":"Mentler","sequence":"additional","affiliation":[{"name":"Human Computer Interaction und User Experience , Trier University of Applied Sciences , Trier , Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6392-8127","authenticated-orcid":false,"given":"Simon","family":"Nestler","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science , Technische Hochschule Ingolstadt , Ingolstadt , Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1920-038X","authenticated-orcid":false,"given":"Christian","family":"Reuter","sequence":"additional","affiliation":[{"name":"Science and Technology for Peace and Security (PEASEC) , Technical University of Darmstadt , Darmstadt , Germany"}]}],"member":"374","published-online":{"date-parts":[[2025,3,31]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Kahle, M.; Kempf, M.; Martin, B.; Glaser, R. Classifying the 2021 \u201cAhrtal\u201d Flood Event Using Hermeneutic Interpretation, Natural Language Processing, and Instrumental Data Analyses. Environ. Res. Commun. 2022, 4 (5), 16. https:\/\/doi.org\/10.1088\/2515-7620\/ac6657.","key":"2025041608115013008_j_icom-2025-0009_ref_001","DOI":"10.1088\/2515-7620\/ac6657"},{"doi-asserted-by":"crossref","unstructured":"Behnassi, M.; El Haiba, M. Implications of the Russia\u2013Ukraine War for Global Food Security. Nat. Hum. Behav. 2022, 6 (6), 754\u2013755. https:\/\/doi.org\/10.1038\/s41562-022-01391-x.","key":"2025041608115013008_j_icom-2025-0009_ref_002","DOI":"10.1038\/s41562-022-01391-x"},{"doi-asserted-by":"crossref","unstructured":"Murray, C. J. L. COVID-19 will Continue but the End of the Pandemic is Near. Lancet 2022, 399 (10323), 417\u2013419. https:\/\/doi.org\/10.1016\/S0140-6736(22)00100-3.","key":"2025041608115013008_j_icom-2025-0009_ref_003","DOI":"10.1016\/S0140-6736(22)00100-3"},{"doi-asserted-by":"crossref","unstructured":"Steffen, W.; Richardson, K.; Rockstr\u00f6m, J.; Cornell, S. E.; Fetzer, I.; Bennett, E. M.; Biggs, R.; Carpenter, S. R.; de Vries, W.; de Wit, C. A.; Folke, C.; Gerten, D.; Heinke, J.; Mace, G. M.; Persson, L. M.; Ramanathan, V.; Reyers, B.; S\u00f6rlin, S. Planetary Boundaries: Guiding Human Development on a Changing Planet. Science 2015, 347 (6223), 1259855. https:\/\/doi.org\/10.1126\/science.1259855.","key":"2025041608115013008_j_icom-2025-0009_ref_004","DOI":"10.1126\/science.1259855"},{"doi-asserted-by":"crossref","unstructured":"Naveed Noor, M.; Kumar Prankumar, S.; Alkhaldi, M.; Torres, I. Academic Voices on the Health and Humanitarian Crises in Gaza. Med. Conflict Surviv. 2025, 1\u201317. https:\/\/doi.org\/10.1080\/13623699.2025.2473802.","key":"2025041608115013008_j_icom-2025-0009_ref_005","DOI":"10.1080\/13623699.2025.2473802"},{"doi-asserted-by":"crossref","unstructured":"Imran, M.; Castillo, C.; Diaz, F.; Vieweg, S. Processing Social Media Messages in Mass Emergency: A Survey. ACM Comput. Surv. 2015, 47 (4), 1\u201338. https:\/\/doi.org\/10.1145\/2771588.","key":"2025041608115013008_j_icom-2025-0009_ref_006","DOI":"10.1145\/2771588"},{"doi-asserted-by":"crossref","unstructured":"Kaufhold, M.-A. Information Refinement Technologies for Crisis Informatics: User Expectations and Design Principles for Social Media and Mobile Apps; Springer Vieweg: Wiesbaden, Germany, 2021.","key":"2025041608115013008_j_icom-2025-0009_ref_007","DOI":"10.1007\/978-3-658-33341-6"},{"doi-asserted-by":"crossref","unstructured":"Heise, M.; Pietsch, M.; Steinke, F.; Bauer, M.; Yilmaz, B. Optimized UAV Placement for Resilient Crisis Communication and Power Grid Restoration. In 2022 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe); IEEE: Novi Sad, Serbia, 2022; pp.\u00a01\u20135.","key":"2025041608115013008_j_icom-2025-0009_ref_008","DOI":"10.1109\/ISGT-Europe54678.2022.9960494"},{"unstructured":"Kuntke, F.; Baumg\u00e4rtner, L.; Reuter, C. Rural Communication in Outage Scenarios: Disruption-Tolerant Networking via LoRaWAN Setups. In Proceedings of Information Systems for Crisis Response and Management (ISCRAM), 2023; pp.\u00a01\u201313. https:\/\/idl.iscram.org\/files\/kuntke\/2023\/2581_Kuntke_etal2023.pdf.","key":"2025041608115013008_j_icom-2025-0009_ref_009"},{"doi-asserted-by":"crossref","unstructured":"Ki Kwok, P.; Yan, M.; Chan, B. K. P.; Lau, H. Y. K. Crisis Management Training Using Discrete-Event Simulation and Virtual Reality Techniques. Comput. Ind. Eng. 2019, 135, 711\u2013722. https:\/\/doi.org\/10.1016\/j.cie.2019.06.035.","key":"2025041608115013008_j_icom-2025-0009_ref_010","DOI":"10.1016\/j.cie.2019.06.035"},{"doi-asserted-by":"crossref","unstructured":"Kwok, P. K.; Yan, M.; Qu, T.; Lau, H. Y. K. User Acceptance of Virtual Reality Technology for Practicing Digital Twin-Based Crisis Management. Int. J. Comput. Integrated Manuf. 2021, 34 (7 8), 874\u2013887. https:\/\/doi.org\/10.1080\/0951192X.2020.1803502.","key":"2025041608115013008_j_icom-2025-0009_ref_011","DOI":"10.1080\/0951192X.2020.1803502"},{"doi-asserted-by":"crossref","unstructured":"Kaufhold, M.-A. Exploring the Evolving Landscape of Human-Centred Crisis Informatics: Current Challenges and Future Trends. I-com \u2013 J. Interact. Media 2024, 23, 155\u2013163. https:\/\/doi.org\/10.1515\/icom-2024-0002.","key":"2025041608115013008_j_icom-2025-0009_ref_012","DOI":"10.1515\/icom-2024-0002"},{"unstructured":"Schmid, S.; Guntrum, L.; Haesler, S.; Schulthei\u00df, L.; Reuter, C. Digital Volunteers During the COVID-19 Pandemic: Care Work on Social Media for Socio-Technical Resilience. Weizenbaum J. Digit. Soc. 2023, 3 (1), 1\u201331; https:\/\/doi.org\/10.34669\/WI.WJDS\/3.3.6.","key":"2025041608115013008_j_icom-2025-0009_ref_013"},{"doi-asserted-by":"crossref","unstructured":"Perng, S.-Y.; B\u00fcscher, M.; Wood, L.; Halvorsrud, R.; Stiso, M.; Ramirez, L.; Al-Akkad, A. Peripheral Response: Microblogging During the 22\/7\/2011 Norway Attacks. Int. J. Inf. Syst. Crisis Response Manag. 2013, 5 (1), 41\u201357. https:\/\/doi.org\/10.4018\/jiscrm.2013010103.","key":"2025041608115013008_j_icom-2025-0009_ref_014","DOI":"10.4018\/jiscrm.2013010103"},{"doi-asserted-by":"crossref","unstructured":"Reuter, C.; Ludwig, T.; Kaufhold, M.-A.; Spielhofer, T. Emergency Services Attitudes Towards Social Media: A Quantitative and Qualitative Survey Across Europe. Int. J. Hum.-Comput. Stud. 2016, 95, 96\u2013111. https:\/\/doi.org\/10.1016\/j.ijhcs.2016.03.005.","key":"2025041608115013008_j_icom-2025-0009_ref_015","DOI":"10.1016\/j.ijhcs.2016.03.005"},{"doi-asserted-by":"crossref","unstructured":"Karl, I.; Rother, K.; Nestler, S. Crisis-Related Apps: Assistance for Critical and Emergency Situations. Int. J. Inf. Syst. Crisis Response Manag. 2015, 7 (2), 19\u201335. https:\/\/doi.org\/10.4018\/IJISCRAM.2015040102.","key":"2025041608115013008_j_icom-2025-0009_ref_016","DOI":"10.4018\/IJISCRAM.2015040102"},{"doi-asserted-by":"crossref","unstructured":"Reuter, C.; Kaufhold, M.-A.; Biselli, T.; Pleil, H. Increasing Adoption Despite Perceived Limitations of Social Media in Emergencies: Representative Insights on German Citizens\u2019 Perception and Trends from 2017 to 2021. Int. J. Disaster Risk Reduct. 2023, 96, 103880. https:\/\/doi.org\/10.1016\/j.ijdrr.2023.103880.","key":"2025041608115013008_j_icom-2025-0009_ref_017","DOI":"10.1016\/j.ijdrr.2023.103880"},{"doi-asserted-by":"crossref","unstructured":"Kaufhold, M.-A.; Riebe, T.; Bayer, M.; Reuter, C. \u2018We Do Not Have the Capacity to Monitor All Media\u2019: A Design Case Study on Cyber Situational Awareness in Computer Emergency Response Teams. In Proceedings of the Conference on Human Factors in Computing Systems (CHI) (CHI \u201924); Association for Computing Machinery: New York, NY, USA, 2024.","key":"2025041608115013008_j_icom-2025-0009_ref_018","DOI":"10.1145\/3613904.3642368"},{"doi-asserted-by":"crossref","unstructured":"Van Der Kleij, R.; Kleinhuis, G.; Young, H. Computer Security Incident Response Team Effectiveness: A Needs Assessment. Front. Psychol. 2017, 8, 2179. https:\/\/doi.org\/10.3389\/fpsyg.2017.02179.","key":"2025041608115013008_j_icom-2025-0009_ref_019","DOI":"10.3389\/fpsyg.2017.02179"},{"doi-asserted-by":"crossref","unstructured":"Flegel, N.; Wessel, D.; P\u00f6hler, J.; Laerhoven, K. V.; Mentler, T. Autonomy and Safety: A Quantitative Study with Control Room Operators on Affinity for Technology Interaction and Wish for Pervasive Computing Solutions. In Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA \u201823); Association for Computing Machinery: New York, NY, USA, 2023; p.\u00a010.","key":"2025041608115013008_j_icom-2025-0009_ref_020","DOI":"10.1145\/3544549.3585822"},{"doi-asserted-by":"crossref","unstructured":"Flegel, N.; Poehler, J.; Mentler, T.; Laerhoven, K. V. Whereables? Examining Personal Technology Adoption in Contemporary Control Rooms. IEEE Pervasive Comput. 2023, 22 (2), 49\u201353. https:\/\/doi.org\/10.1109\/MPRV.2023.3251539.","key":"2025041608115013008_j_icom-2025-0009_ref_021","DOI":"10.1109\/MPRV.2023.3251539"},{"doi-asserted-by":"crossref","unstructured":"Kaufhold, M.-A.; Rupp, N.; Reuter, C.; Habdank, M. Mitigating Information Overload in Social Media during Conflicts and Crises: Design and Evaluation of a Cross-Platform Alerting System. Behav. Inf. Technol. 2020, 39 (3), 319\u2013342. https:\/\/doi.org\/10.1080\/0144929X.2019.1620334.","key":"2025041608115013008_j_icom-2025-0009_ref_022","DOI":"10.1080\/0144929X.2019.1620334"},{"unstructured":"Berndt, H.; Wessel, D. Immersion and Presence in Virtual Reality Training for Mass Casualty Incidents. In Proceedings of the 15th ISCRAM Conference, 2018. https:\/\/idl.iscram.org\/files\/henrikberndt\/2018\/2153_HenrikBerndt_etal2018.pdf.","key":"2025041608115013008_j_icom-2025-0009_ref_023"},{"doi-asserted-by":"crossref","unstructured":"Mentler, T.; Herczeg, M.; Jent, S.; Stoislow, M.; Kindsm\u00fcller, M. C.; Rumland, T. Routine Mobile Applications for Emergency Medical Services in Mass Casualty Incidents. Biomed. Eng.\/Biomed. Tech. 2012, 57, 784\u2013787. https:\/\/doi.org\/10.1515\/bmt-2012-4457.","key":"2025041608115013008_j_icom-2025-0009_ref_024","DOI":"10.1515\/bmt-2012-4457"},{"unstructured":"B\u00e4umler, J.; Kaufhold, M.-A.; Voronin, G.; Reuter, C. Towards an Online Hate Speech Classification Scheme for German Law Enforcement and Reporting Centers: Insights from Research and Practice. In Mensch und Computer 2024 \u2013 Workshopband; Gesellschaft f\u00fcr Informatik e.V.: Karlsruhe, Germany, 2024.","key":"2025041608115013008_j_icom-2025-0009_ref_025"},{"unstructured":"B\u00e4umler, J.; Riebe, T.; Kaufhold, M.-A.; Reuter, C. Harnessing Inter-Organizational Collaboration and Automation to Combat Online Hate Speech: A Qualitative Study with German Reporting Centers. In Proceedings of the ACM: Human Computer Interaction (PACM): Computer-Supported Cooperative Work and Social Computing, 2025.","key":"2025041608115013008_j_icom-2025-0009_ref_026"},{"doi-asserted-by":"crossref","unstructured":"Nestler, S. Evaluation der Mensch-Computer-Interaktion in Krisenszenarien\/Evaluating Human-Computer-Interaction in Crisis Scenarios. I-com 2014, 13 (1), 53\u201362. https:\/\/doi.org\/10.1515\/icom-2014-0008.","key":"2025041608115013008_j_icom-2025-0009_ref_027","DOI":"10.1515\/icom-2014-0008"},{"doi-asserted-by":"crossref","unstructured":"Rohde, M.; Br\u00f6dner, P.; Stevens, G.; Betz, M.; Wulf, V. Grounded Design \u2013 A Praxeological IS Research Perspective. J. Inform. Technol. 2017, 32 (2), 163\u2013179. https:\/\/doi.org\/10.1057\/jit.2016.5.","key":"2025041608115013008_j_icom-2025-0009_ref_028","DOI":"10.1057\/jit.2016.5"},{"doi-asserted-by":"crossref","unstructured":"Reuter, C. Einleitung in die sicherheitskritische Mensch-Computer-Interaktion. In Sicherheitskritische Mensch-Computer-Interaktion; Reuter, C., Ed.; Springer Vieweg: Wiesbaden, 2021.","key":"2025041608115013008_j_icom-2025-0009_ref_029","DOI":"10.1007\/978-3-658-32795-8"},{"doi-asserted-by":"crossref","unstructured":"Reuter, C. Sicherheitskritische Mensch-Computer-Interaktion; Springer Vieweg: Wiesbaden, 2021.","key":"2025041608115013008_j_icom-2025-0009_ref_030","DOI":"10.1007\/978-3-658-32795-8"},{"doi-asserted-by":"crossref","unstructured":"Reuter, C.; Lo Iacono, L.; Benlian, A. A Quarter Century of Usable Security and Privacy Research: Transparency, Tailorability, and the Road Ahead. Behav. Inf. Technol. 2022, 41 (10), 2035\u20132048. https:\/\/doi.org\/10.1080\/0144929X.2022.2080908.","key":"2025041608115013008_j_icom-2025-0009_ref_031","DOI":"10.1080\/0144929X.2022.2080908"},{"doi-asserted-by":"crossref","unstructured":"Alt, F.; von Zezschwitz, E. Emerging Trends in Usable Security and Privacy. I-com 2019, 18 (3), 189\u2013195. https:\/\/doi.org\/10.1515\/icom-2019-0019.","key":"2025041608115013008_j_icom-2025-0009_ref_032","DOI":"10.1515\/icom-2019-0019"},{"doi-asserted-by":"crossref","unstructured":"Mentler, T.; Reuter, C.; Geisler, S. Introduction to This Special Issue on \u201cHuman-Machine Interaction and Cooperation in Safety-Critical Systems\u201d. I-com 2016, 15 (3), 219\u2013226. https:\/\/doi.org\/10.1515\/icom-2016-0037.","key":"2025041608115013008_j_icom-2025-0009_ref_033","DOI":"10.1515\/icom-2016-0037"}],"container-title":["i-com"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/icom-2025-0009\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/icom-2025-0009\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T08:14:14Z","timestamp":1744791254000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/icom-2025-0009\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,2,26]]},"published-print":{"date-parts":[[2025,4,16]]}},"alternative-id":["10.1515\/icom-2025-0009"],"URL":"https:\/\/doi.org\/10.1515\/icom-2025-0009","relation":{},"ISSN":["2196-6826"],"issn-type":[{"type":"electronic","value":"2196-6826"}],"subject":[],"published":{"date-parts":[[2025,3,31]]}}}