{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T23:40:06Z","timestamp":1713051606274},"reference-count":56,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4,1]]},"abstract":"<p>This paper draws on the socio-technical research tradition in information systems to re-conceptualize the information security in emergency response. A conceptual basis encompassing the three layers\u2014technical, cognitive, and organizational\u2014is developed by synthesizing Actor Network Theory and Theory of Organizational Routines. This paper makes the assumption that the emergency response context is built on the relationship between association and connectivity, which continuously shapes the emergency action network and its routines. Empirically, the analysis is based on a single case study conducted across three emergency departments. The data thus collected on information security, emergency department routines, and emergency actions is used to theorize specifically on the association\/connectivity relationship. The resultant findings point to the fact that information security layers have a meaning in emergency response that is different from mainstream definitions of information security.<\/p>","DOI":"10.4018\/jiscrm.2011040101","type":"journal-article","created":{"date-parts":[[2011,10,19]],"date-time":"2011-10-19T16:30:49Z","timestamp":1319041849000},"page":"1-17","source":"Crossref","is-referenced-by-count":0,"title":["Multi-Layers of Information Security in Emergency Response"],"prefix":"10.4018","volume":"3","author":[{"given":"Dan","family":"Harnesk","sequence":"first","affiliation":[{"name":"Lule\u00e5 University of Technology, Sweden"}]},{"given":"Heidi","family":"Hartikainen","sequence":"additional","affiliation":[{"name":"Lule\u00e5 University of Technology, Sweden"}]}],"member":"2432","reference":[{"issue":"2","key":"jiscrm.2011040101-0","doi-asserted-by":"crossref","DOI":"10.1111\/j.1083-6101.1997.tb00069.x","article-title":"Bridging the gulfs: From hypertext to cyberspace.","volume":"3","author":"T.Bardini","year":"1997","journal-title":"Journal of Computer-Mediated Communication"},{"key":"jiscrm.2011040101-1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.1991.20"},{"key":"jiscrm.2011040101-2","author":"M.Bishop","year":"2003","journal-title":"Computer security: Art and science"},{"key":"jiscrm.2011040101-3","first-page":"196","article-title":"Some elements of a sociology of translation: Domestication of the scallops and the fishermen in St. Brieuc's bay","author":"M.Callon","year":"1986","journal-title":"Power, action and belief: A new sociology of knowledge?"},{"key":"jiscrm.2011040101-4","first-page":"132","article-title":"Techno-economic networks and irreversibility","author":"M.Callon","year":"1991","journal-title":"A sociology of monsters: Essays on power, technology and domination"},{"key":"jiscrm.2011040101-5","unstructured":"Carlsson, S. A. (2001). Knowledge management in network contexts. Paper presented at the the 9th European Conference on Information Systems."},{"key":"jiscrm.2011040101-6","doi-asserted-by":"publisher","DOI":"10.1145\/1226736.1226761"},{"key":"jiscrm.2011040101-7","doi-asserted-by":"publisher","DOI":"10.1145\/1342327.1342340"},{"key":"jiscrm.2011040101-8","first-page":"958","article-title":"Management of information security: Challenges and research directions.","volume":"20","author":"J.Choobineh","year":"2007","journal-title":"Communications of the AIS"},{"key":"jiscrm.2011040101-9","author":"L. K.Comfort","year":"1999","journal-title":"Shared risk: Complex seismic response"},{"key":"jiscrm.2011040101-10","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.polisci.8.081404.075608"},{"key":"jiscrm.2011040101-11","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6210.2007.00827.x"},{"key":"jiscrm.2011040101-12","doi-asserted-by":"publisher","DOI":"10.1177\/1087724X06289052"},{"key":"jiscrm.2011040101-13","doi-asserted-by":"publisher","DOI":"10.1111\/1468-5973.00164"},{"key":"jiscrm.2011040101-14","unstructured":"Cordella, A., & Shaikh, M. (2003). Actor network theory and after: What's new for IS research? In Proceedings of the 11th European Conference on Information Systems."},{"key":"jiscrm.2011040101-15","doi-asserted-by":"publisher","DOI":"10.1111\/1468-5973.00141"},{"key":"jiscrm.2011040101-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2007.12.012"},{"key":"jiscrm.2011040101-17","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-5973.2006.00479.x"},{"key":"jiscrm.2011040101-18","author":"G.Dhillon","year":"2007","journal-title":"Principles of information security: Text and cases"},{"key":"jiscrm.2011040101-19","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00099.x"},{"key":"jiscrm.2011040101-20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2006.00219.x"},{"key":"jiscrm.2011040101-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.09.009"},{"key":"jiscrm.2011040101-22","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1177\/028072709401200201","article-title":"Community emergency planning: False assumptions and inappropriate analogies.","volume":"12","author":"R. R.Dynes","year":"1994","journal-title":"International Journal of Mass Emergencies and Disasters"},{"key":"jiscrm.2011040101-23","unstructured":"Feldman, M. S., & Pentland, B. (2005). Organizational routines and the macro-actor. In B. A. H. Czarniawska, T (Ed.), Actor-network theory and organizing (pp. 91-111). Copenhagen, Denmark: Copenhagen Business School Press."},{"key":"jiscrm.2011040101-24","doi-asserted-by":"publisher","DOI":"10.1111\/1467-6486.00294"},{"key":"jiscrm.2011040101-25","unstructured":"Goldkuhl, G. (2005). Socio-instrumental pragmatism: A theoretical synthesis for pragmatic conceptualisation in information systems. In Proceedings of the Third International Conference on Action in Language, Organisations and Information Systems, Limerick, Ireland."},{"key":"jiscrm.2011040101-26","doi-asserted-by":"publisher","DOI":"10.1177\/0002716205285404"},{"key":"jiscrm.2011040101-27","article-title":"Inscribing organizational change with information technology","author":"J.Holmstr\u00f6m","year":"2005","journal-title":"Actor-network theory and organising"},{"key":"jiscrm.2011040101-28","doi-asserted-by":"publisher","DOI":"10.1145\/1226736.1226738"},{"key":"jiscrm.2011040101-29","doi-asserted-by":"crossref","unstructured":"Jennex, M. E. (2007). Modeling emergency response systems. In Proceedings of the 40th Hawaii International Conference on System Sciences.","DOI":"10.1109\/HICSS.2007.386"},{"key":"jiscrm.2011040101-30","unstructured":"Jul, S. (2007). Who's really on first? A domain-level user, task and context analysis for response technology. In Proceedings of the ISCRAM Intelligent Human Computer Systems for Crisis Response and Management Conference."},{"key":"jiscrm.2011040101-31","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.08.001"},{"key":"jiscrm.2011040101-32","doi-asserted-by":"crossref","unstructured":"Kristensen, M., Kyng, M., & Palen, L. (2006). Participatory design in emergency medical service: Designing for future practice. In Proceedings of the CHI Conference on Participatory Design.","DOI":"10.1145\/1124772.1124798"},{"key":"jiscrm.2011040101-33","first-page":"264","article-title":"The power of association","author":"B.Latour","year":"1986","journal-title":"Power, action and belief: A new sociology of knowledge?"},{"key":"jiscrm.2011040101-34","author":"B.Latour","year":"1987","journal-title":"Science in action"},{"key":"jiscrm.2011040101-35","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780199256044.001.0001","author":"B.Latour","year":"2005","journal-title":"Reassembling the social: An introduction to actor-network theory"},{"key":"jiscrm.2011040101-36","doi-asserted-by":"publisher","DOI":"10.1145\/1226736.1226765"},{"key":"jiscrm.2011040101-37","author":"V.Mayer-Schoenberger","year":"2002","journal-title":"Emergency communications: The quest for interoperability in the United States and Europe"},{"key":"jiscrm.2011040101-38","doi-asserted-by":"publisher","DOI":"10.1145\/1226736.1226764"},{"issue":"2","key":"jiscrm.2011040101-39","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1177\/028072700402200201","article-title":"Studying organizationally-situated improvisation in response to extreme events.","volume":"22","author":"D.Mendon\u00e7a","year":"2004","journal-title":"International Journal of Mass Emergencies and Disasters"},{"key":"jiscrm.2011040101-40","doi-asserted-by":"crossref","unstructured":"Mendon\u00e7a, D., & Wallace, W. A. (2007). A cognitive model of improvisation in emergency management. IEEE Transactions on Systems, Man, and Cybernetics: Part A.","DOI":"10.1109\/TSMCA.2007.897581"},{"key":"jiscrm.2011040101-41","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1266297"},{"key":"jiscrm.2011040101-42","author":"M. B.Miles","year":"1994","journal-title":"Qualitative data analysis"},{"key":"jiscrm.2011040101-43","unstructured":"Murhen, W., Van Den Eede, G., & Van de Walle, B. (2008). Sensemaking as a methodology for ISCRAM research: Information processing in an ongoing crisis. In Proceedings of the 5th International ISCRAM Conference, Washington, DC."},{"key":"jiscrm.2011040101-44","doi-asserted-by":"publisher","DOI":"10.1016\/S0016-3287(03)00149-6"},{"key":"jiscrm.2011040101-45","doi-asserted-by":"publisher","DOI":"10.1177\/0170840607081138"},{"key":"jiscrm.2011040101-46","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1070.0283"},{"key":"jiscrm.2011040101-47","doi-asserted-by":"publisher","DOI":"10.1111\/j.0361-3666.2003.00237.x"},{"key":"jiscrm.2011040101-48","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoandorg.2004.11.001"},{"issue":"1","key":"jiscrm.2011040101-49","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/1216218.1216224","article-title":"A review of information security issues and respective research contributions.","volume":"38","author":"M. T.Siponen","year":"2007","journal-title":"The Data Base for Advances in Information Systems"},{"key":"jiscrm.2011040101-50","unstructured":"Stahl, B. C., Shaw, M., & Doherty, N. F. (2008). Information systems security management: A critical research agenda. Paper presented at the Association of Information Systems SIGSEC Workshop on Information Security and Privacy."},{"key":"jiscrm.2011040101-51","doi-asserted-by":"publisher","DOI":"10.1145\/505248.505265"},{"issue":"4","key":"jiscrm.2011040101-52","first-page":"1","article-title":"The design of a dynamic emergency response management information system (DERMIS).","volume":"5","author":"M.Turoff","year":"2004","journal-title":"Journal of Information Technology Theory and Application"},{"key":"jiscrm.2011040101-53","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1007\/978-0-387-35309-8_23","article-title":"Actor-network theory and IS research: Current status and future prospects","author":"G.Walsham","year":"1997","journal-title":"Information systems and qualitative research"},{"key":"jiscrm.2011040101-54","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6210.2006.00673.x"},{"key":"jiscrm.2011040101-55","author":"R.Yin","year":"1994","journal-title":"Case study research"}],"container-title":["International Journal of Information Systems for Crisis Response and Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=55304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T22:29:53Z","timestamp":1713047393000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jiscrm.2011040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,4,1]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jiscrm.2011040101","relation":{},"ISSN":["1937-9390","1937-9420"],"issn-type":[{"value":"1937-9390","type":"print"},{"value":"1937-9420","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,1]]}}}