{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T16:40:09Z","timestamp":1654101609145},"reference-count":23,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4,1]]},"abstract":"<p>Operative role management relates to delegating the right roles to the right resources at a specific moment. Role management is commonly understood as technical role management, relating to access control and administrative role management. Operative role management is the practical daily work of emergency organizations\u2019 personnel and relates to overall resource management. The authors have carried out in-depth ethnographic research on the topic and distinguish the difference between operative and technical role management. The research for this paper concentrates on the practical work processes of the emergency management staff and not merely on the information systems and their functionalities. They focus on describing the interdependencies between the two role management approaches with examples from our field studies and findings from literature.<\/p>","DOI":"10.4018\/jiscrm.2012040102","type":"journal-article","created":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T18:32:12Z","timestamp":1349116332000},"page":"22-34","source":"Crossref","is-referenced-by-count":0,"title":["Operative vs. Technical Role Management in Emergency Organizations"],"prefix":"10.4018","volume":"4","author":[{"given":"Taina","family":"Kurki","sequence":"first","affiliation":[{"name":"University of Eastern Finland, Finland"}]},{"given":"Hanna-Miina","family":"Sihvonen","sequence":"additional","affiliation":[{"name":"University of Eastern Finland, Finland"}]}],"member":"2432","reference":[{"issue":"4","key":"jiscrm.2012040102-0","first-page":"272","article-title":"An RBAC model-based approach to specify the access policies of web-based emergency information systems.","volume":"11","author":"I.Aedo","year":"2006","journal-title":"International Journal of Intelligent Control and Systems"},{"key":"jiscrm.2012040102-1","doi-asserted-by":"crossref","unstructured":"Al-Kahtani, M. A., & Sandhu, R. S. (2002). A model for attribute-based user role assignment. In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, NV.","DOI":"10.1109\/CSAC.2002.1176307"},{"key":"jiscrm.2012040102-2","doi-asserted-by":"crossref","first-page":"532","DOI":"10.2307\/258557","article-title":"Building theories from case study research.","volume":"14","author":"K.Eisenhardt","year":"1989","journal-title":"Academy of Management Review"},{"key":"jiscrm.2012040102-3","author":"D. F.Ferraiolo","year":"2007","journal-title":"Role-based access control"},{"key":"jiscrm.2012040102-4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2006.875726"},{"key":"jiscrm.2012040102-5","author":"M.Hammersley","year":"1996","journal-title":"Ethnography. Principles in practice"},{"key":"jiscrm.2012040102-6","unstructured":"Ianella, R., & Henricksen, K. (2007). Managing information in the disaster coordination centre: Lessons and opportunities. In Proceedings of the International Community on Information Systems for Crisis Response and Management, Delft, The Netherlands."},{"key":"jiscrm.2012040102-7","doi-asserted-by":"crossref","unstructured":"Kim, Y. G., Mon, C. J., Jeong, D., Lee, J. O., Song, C. Y., & Baik, D. K. (2005). Context-aware access control mechanism for ubiquitous applications. In P. S. Szczepaniak, J. Kacprzyk, & A. Niewiadomski (Eds.), Proceedings of the Third International Conference on Advances in Web Intelligence (LNCS 3528, pp. 932-935).","DOI":"10.1007\/11495772_37"},{"key":"jiscrm.2012040102-8","doi-asserted-by":"crossref","unstructured":"Kurki, T. A., & Sihvonen, H.-M. (2012). A role-based resource management approach for emergency organizations. In Proceedings of the Hawaii International Conference on System Sciences, Maui, HI.","DOI":"10.1109\/HICSS.2012.81"},{"key":"jiscrm.2012040102-9","author":"M. L.Meadows","year":"2001","journal-title":"Constructing evidence within the qualitative project"},{"key":"jiscrm.2012040102-10","doi-asserted-by":"crossref","unstructured":"Mehrotra, S., Butss, C. T., Klashnikov, D., & Venkatasubramanian, V. (2004). Project RESCUE: Challenges in responding to the unexpected. In Proceedings of the IS&T\/SPIE International Conference on Internet Imaging.","DOI":"10.1117\/12.537805"},{"key":"jiscrm.2012040102-11","unstructured":"Sanz, D., Aedo, I., Diaz, M. P., & de Castro, J. (2006). Modelling emergency response communities using RBAC principles. In Proceedings of the International Conference on Information Systems for Crisis Response and Management, Newark, NJ."},{"key":"jiscrm.2012040102-12","unstructured":"Sanz, D., G\u00f3mez Bello, P., D\u00edaz, P., Sainz, F. J., & Aedo, I. (2007). Supporting physical and logical communication in emergency management virtual distributed teams. In Proceedings of the Intelligent Human Computer Systems for Crisis Response and Management, Delft, The Netherlands (pp. 439-448)."},{"key":"jiscrm.2012040102-13","doi-asserted-by":"crossref","unstructured":"Sihvonen, H.-M., & Kurki, T. (2010). Role management diversity in emergency situations. In Proceedings of the IEEE International Conference on Technologies for Homeland Security, Boston, MA.","DOI":"10.1109\/THS.2010.5655046"},{"key":"jiscrm.2012040102-14","doi-asserted-by":"crossref","unstructured":"Smirnov, A. V., Pashkin, M., Levashova, T., Shilov, N., & Kashevnik, A. (2007). Role-based decision mining for multiagent emergency response management. In V. Gorodetsky, C. Zhang, V. Skormin, & L. Cao (Eds.), Proceedings of the Second International Workshop on Autonomous Intelligent Systems: Multi-Agents and Data Mining (LNCS 4476, pp. 178-191).","DOI":"10.1007\/978-3-540-72839-9_15"},{"key":"jiscrm.2012040102-15","unstructured":"Tahir, M. N. (2007). C-RBAC: Contextual role-based access control model. Ubiquitous Computing and Communication Journal, 2(3)."},{"key":"jiscrm.2012040102-16","author":"S. A.White","year":"2008","journal-title":"BPMN modeling and reference guide"},{"key":"jiscrm.2012040102-17","author":"T.Wiikinkoski","year":"2010","journal-title":"Erityistilanne prosessina - \u201cformaalin kuvausmenetelm\u00e4n k\u00e4ytt\u00f6kelpoisuus moniviranomaistilanteen yhteistoiminnan kehitt\u00e4misess\u00e4"},{"issue":"1","key":"jiscrm.2012040102-18","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1504\/IJEM.2006.010279","article-title":"Exploring complex emergency situations' dynamic: Theoretical, epistemological and methodological proposals.","volume":"3","author":"J.-L.Wybo","year":"2006","journal-title":"International Journal of Emergency Management"},{"key":"jiscrm.2012040102-19","doi-asserted-by":"crossref","unstructured":"Wybo, J.-L., & Lonka, H. (2002). Emergency management and information society - How to improve the synergy? Paper presented at the Workshop on Emergency Telecommunications.","DOI":"10.1504\/IJEM.2002.000519"},{"key":"jiscrm.2012040102-20","unstructured":"Yin, R. (2009). Case study research design and methods (4th ed. ed.). Thousand Oaks, CA: Sage."},{"key":"jiscrm.2012040102-21","unstructured":"Zhang, G., & Parashar, M. (2004). Context-aware dynamic access control for pervasive applications. In Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference, San Diego, CA."},{"key":"jiscrm.2012040102-22","unstructured":"Zhu, H., & Zhou, M. C. (2006). The role transferability in emergency management systems. In Proceedings of the International Conference on Information Systems for Crisis Response and Management, Newark, NJ."}],"container-title":["International Journal of Information Systems for Crisis Response and Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=72125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T16:14:59Z","timestamp":1654100099000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jiscrm.2012040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,4,1]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jiscrm.2012040102","relation":{},"ISSN":["1937-9390","1937-9420"],"issn-type":[{"value":"1937-9390","type":"print"},{"value":"1937-9420","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,1]]}}}