{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T07:12:32Z","timestamp":1680333152375},"reference-count":23,"publisher":"Walter de Gruyter GmbH","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2,25]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Dealing with usability issues of safety-critical interactive systems is essential for an efficient, effective and joyful use of these systems. This paper describes a prototypical safety-critical environment and discusses the HCI (human computer interaction) challenges of different interactive systems for safety-critical environments. We designed, developed and evaluated various interactive systems which solve different challenges in so-called mass casualty incidents (MCIs). In summary, we made contributions to three different areas of application: Mobile computing in safety-critical environments, simulation of safety-critical environments and social media in safety-critical environments. Finally, this paper gives further insights how all these research results can to be brought together in the future in order to be able to build usable interactive systems for safety-critical environments.<\/jats:p>","DOI":"10.1515\/itit-2018-0037","type":"journal-article","created":{"date-parts":[[2019,1,4]],"date-time":"2019-01-04T09:01:35Z","timestamp":1546592495000},"page":"67-70","source":"Crossref","is-referenced-by-count":1,"title":["Safety-critical human computer interaction"],"prefix":"10.1515","volume":"61","author":[{"given":"Simon","family":"Nestler","sequence":"first","affiliation":[{"name":"Hochschule Hamm-Lippstadt , Marker Allee 76-78 , , Hamm , Germany"}]}],"member":"374","published-online":{"date-parts":[[2019,1,4]]},"reference":[{"key":"2023033119301494274_j_itit-2018-0037_ref_001_w2aab3b7d473b1b6b1ab2ab1Aa","doi-asserted-by":"crossref","unstructured":"M.\u2009S. Baker: Creating order from chaos (Part I): Triage, initial care, and tactical considerations in mass casualty and disaster response. Military medicine, 172(3) (2007):232\u2013236.","DOI":"10.7205\/MILMED.172.3.232"},{"key":"2023033119301494274_j_itit-2018-0037_ref_002_w2aab3b7d473b1b6b1ab2ab2Aa","doi-asserted-by":"crossref","unstructured":"A. Flemming and H. Adams: Rettungsdienstliche Versorgung beim Massenanfall von Verletzten (MANV). Intensivmedizin und Notfallmedizin, 44(7) (2007):452\u2013459.","DOI":"10.1007\/s00390-007-0815-5"},{"key":"2023033119301494274_j_itit-2018-0037_ref_003_w2aab3b7d473b1b6b1ab2ab3Aa","doi-asserted-by":"crossref","unstructured":"Gutsch W, Huppertz T, Zollner C, Hornburger P, Kay M, Kreimeier U, Sch\u00e4uble W, Kanz K.: Initiale Sichtung durch Rettungsassistenten. Ergebnisse bei \u00dcbungen zum Massenanfall von Verletzten. Notfall & Rettungsmedizin, 9(4) (2006):384\u20133888. DOI: 10.1007\/s10049-006-0827-x.","DOI":"10.1007\/s10049-006-0827-x"},{"key":"2023033119301494274_j_itit-2018-0037_ref_004_w2aab3b7d473b1b6b1ab2ab4Aa","unstructured":"S. Nestler, G. Klinker: Mobile computing in mass casualty incidents (MCIs), In: Mobiles Computing in der Medizin (MoCoMed), pp.\u20091155\u20131169, 2009."},{"key":"2023033119301494274_j_itit-2018-0037_ref_005_w2aab3b7d473b1b6b1ab2ab5Aa","doi-asserted-by":"crossref","unstructured":"E.-M. Jakobs: Kommunikative Usability. In: Sprache und Kommunikation im technischen Zeital- ter. Wieviel Internet (v)ertr\u00e4gt unsere Gesellschaft, pp.\u2009119\u2013142, 2012.","DOI":"10.1515\/9783110282184.119"},{"key":"2023033119301494274_j_itit-2018-0037_ref_006_w2aab3b7d473b1b6b1ab2ab6Aa","doi-asserted-by":"crossref","unstructured":"K.\u2009G. Kanz, P. Hornburger, M. Kay, W. Mutschler, and W. Sch\u00e4uble: mSTaRT-Algorithmus f\u00fcr Sichtung, Behandlung und Transport bei einem Massenanfall von Verletzten. Notfall- & Ret- tungsmedizin, 9(3) (2006):264\u2013270.","DOI":"10.1007\/s10049-006-0821-3"},{"key":"2023033119301494274_j_itit-2018-0037_ref_007_w2aab3b7d473b1b6b1ab2ab7Aa","unstructured":"S. Nestler, G. Klinker: Using Mobile Hand-Held Computers in Disasters, In: UbiComp Workshop on Interaction with Ubiquitous Wellness and Healthcare Applications (UbiWell), Innsbruck, 2007."},{"key":"2023033119301494274_j_itit-2018-0037_ref_008_w2aab3b7d473b1b6b1ab2ab8Aa","unstructured":"S. Nestler, G. Klinker: Towards adaptive user-interfaces: Developing mobile user-interfaces for the health care domain, In: Mobiles Computing in der Medizin (MoCoMed), Augsburg, 2007."},{"key":"2023033119301494274_j_itit-2018-0037_ref_009_w2aab3b7d473b1b6b1ab2ab9Aa","unstructured":"S. Nestler, M. Huber, G. Klinker: Improving the documentation in mass casualty incidents by combining electronic and paper based approaches, In: AmI-09, 3rd European Conference on Ambient Intelligence, Roots for the Future of Ambient Intelligence, Salzburg, 2009."},{"key":"2023033119301494274_j_itit-2018-0037_ref_010_w2aab3b7d473b1b6b1ab2ac10Aa","unstructured":"S. Nestler, E. Artinger, T. Coskun, T. Endres, G. Klinker: RFID based Patient Registration in Mass Casualty Incidents, In: 10. Workshop Mobile Informationstechnologien \/ Mobiles Computing in der Medizin (MoCoMed), 2010."},{"key":"2023033119301494274_j_itit-2018-0037_ref_011_w2aab3b7d473b1b6b1ab2ac11Aa","unstructured":"S. Nestler, A. Dollinger, F. Echtler, M. Huber, G. Klinker: Design and Development of Virtual Patients, In: Vierter Workshop Virtuelle und Erweiterte Realit\u00e4t der GI-Fachgruppe VR\/AR, Weimar, 2007."},{"key":"2023033119301494274_j_itit-2018-0037_ref_012_w2aab3b7d473b1b6b1ab2ac12Aa","unstructured":"S. Nestler, M. Huber, F. Echtler, A. Dollinger, G. Klinker: Development and evaluation of a virtual reality patient simulation (VRPS), In: The 17-th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision (WSCG), 2009."},{"key":"2023033119301494274_j_itit-2018-0037_ref_013_w2aab3b7d473b1b6b1ab2ac13Aa","doi-asserted-by":"crossref","unstructured":"K. Rother, I. Karl, S. Nestler: Virtual Reality Crisis Simulation for Usability Testing of Mobile Apps, In: A. Weisbecker, M. Burmester & A. Schmidt (Hrsg.): Mensch und Computer Workshopband, Stuttgart, pp\u200969\u201376, 2015.","DOI":"10.1515\/9783110443905-010"},{"key":"2023033119301494274_j_itit-2018-0037_ref_014_w2aab3b7d473b1b6b1ab2ac14Aa","doi-asserted-by":"crossref","unstructured":"K. Rother, I. Karl, S. Nestler: Towards Virtual Reality Crisis Simulation as a Tool for Usability Testing of Crisis Related Interactive Systems, International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 7(3) 2015:40\u201354.","DOI":"10.4018\/IJISCRAM.2015070103"},{"key":"2023033119301494274_j_itit-2018-0037_ref_015_w2aab3b7d473b1b6b1ab2ac15Aa","unstructured":"S. Nestler: Social Media als Mittel der Krisenkommunikation, In: Tagungsband L\u00dcKEX 13: Wissenschaftliche Unsicherheit und Krisenkommunikation in au\u00dfergew\u00f6hnlichen biologischen Bedrohungslagen, Bonn, pp.\u200948\u201354, 2014."},{"key":"2023033119301494274_j_itit-2018-0037_ref_016_w2aab3b7d473b1b6b1ab2ac16Aa","doi-asserted-by":"crossref","unstructured":"I. Karl, S. Nestler: Nutzung von sozialen Medien als b\u00fcrgerzentriertes Fr\u00fchwarnsystem f\u00fcr Krisensituationen, In: Mensch und Computer Workshopband, M\u00fcnchen, pp.\u2009125\u2013130, 2014.","DOI":"10.1524\/9783110344509.125"},{"key":"2023033119301494274_j_itit-2018-0037_ref_017_w2aab3b7d473b1b6b1ab2ac17Aa","unstructured":"K. Rother, I. Karl, S. Nestler: Ein Konzept f\u00fcr die Klassifizierung subjektiver Sicherheit in Tweets, In: B. Weyers, A. Dittmar (Hrsg.): Mensch und Computer Workshopbeitr\u00e4ge, Aachen, 2016."},{"key":"2023033119301494274_j_itit-2018-0037_ref_018_w2aab3b7d473b1b6b1ab2ac18Aa","unstructured":"K. Rother, I. Karl, S. Nestler: Ein konzeptuelles Modell f\u00fcr Kommunikationsstrategien in Krisen basierend auf dem subjektiven Unsicherheitsgef\u00fchl der Bev\u00f6lkerung, In: B. Weyers, A. Dittmar (Hrsg.): Mensch und Computer Workshopbeitr\u00e4ge, Aachen, 2016."},{"key":"2023033119301494274_j_itit-2018-0037_ref_019_w2aab3b7d473b1b6b1ab2ac19Aa","unstructured":"S. Nestler: Kommunikationsstrategien in sozialen Medien f\u00fcr Terror- und Amoklagen, In: Mensch und Computer Workshopbeitr\u00e4ge, Regensburg, 2017."},{"key":"2023033119301494274_j_itit-2018-0037_ref_020_w2aab3b7d473b1b6b1ab2ac20Aa","unstructured":"S. Nestler, B. Elixmann, S. Herrlich: Interacting with Activity Streams, In: M. Eibl & M. Ritter (Hrsg.), Workshop-Proceedings der Tagung Mensch & Computer 2011. \u00fcberMEDIEN|\u00dcBERmorgen. Chemnitz: Universit\u00e4tsverlag Chemnitz, pp\u2009115\u2013118, 2011."},{"key":"2023033119301494274_j_itit-2018-0037_ref_021_w2aab3b7d473b1b6b1ab2ac21Aa","unstructured":"A. Richter, M. Koch, S. Behrendt, S. Nestler, S. M\u00fcller, S. Herrlich: aperto \u2013 Ein Rahmenwerk zur Auswahl, Einf\u00fchrung und Optimierung von Corporate Social Software, Schriften zur soziotechnischen Integration, Band 2, 2012."},{"key":"2023033119301494274_j_itit-2018-0037_ref_022_w2aab3b7d473b1b6b1ab2ac22Aa","unstructured":"S. Nestler: Social Emergency Software \u2013 die Zukunft des Beh\u00f6rdenfunks?, In: Mensch und Computer Workshopbeitr\u00e4ge, Dresden, 2018."},{"key":"2023033119301494274_j_itit-2018-0037_ref_023_w2aab3b7d473b1b6b1ab2ac23Aa","doi-asserted-by":"crossref","unstructured":"S. Nestler, C. Sturm: Quantitative Evaluation der Mensch-Computer-Interaktion im Krisenmanagement, In: C. Reuter (Hrsg.): Sicherheitskritische Mensch-Computer-Interaktion, Springer Lehrbuch, 2018.","DOI":"10.1007\/978-3-658-19523-6_4"}],"container-title":["it - Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.degruyter.com\/view\/j\/itit.2019.61.issue-1\/itit-2018-0037\/itit-2018-0037.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2018-0037\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2018-0037\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T06:47:10Z","timestamp":1680331630000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/itit-2018-0037\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,4]]},"references-count":23,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,2,20]]},"published-print":{"date-parts":[[2019,2,25]]}},"alternative-id":["10.1515\/itit-2018-0037"],"URL":"https:\/\/doi.org\/10.1515\/itit-2018-0037","relation":{},"ISSN":["2196-7032","1611-2776"],"issn-type":[{"value":"2196-7032","type":"electronic"},{"value":"1611-2776","type":"print"}],"subject":[],"published":{"date-parts":[[2019,1,4]]}}}