{"id":"https://openalex.org/W2000485824","doi":"https://doi.org/10.4018/jiscrm.2011040101","title":"Multi-Layers of Information Security in Emergency Response","display_name":"Multi-Layers of Information Security in Emergency Response","publication_year":2011,"publication_date":"2011-04-01","ids":{"openalex":"https://openalex.org/W2000485824","doi":"https://doi.org/10.4018/jiscrm.2011040101","mag":"2000485824"},"language":"en","primary_location":{"id":"doi:10.4018/jiscrm.2011040101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jiscrm.2011040101","pdf_url":null,"source":{"id":"https://openalex.org/S4394735749","display_name":"International Journal of Information Systems for Crisis Response and Management","issn_l":"1937-9420","issn":["1937-9420"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Systems for Crisis Response and Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027731087","display_name":"Dan Harnesk","orcid":null},"institutions":[{"id":"https://openalex.org/I190632392","display_name":"Lule\u00e5 University of Technology","ror":"https://ror.org/016st3p78","country_code":"SE","type":"education","lineage":["https://openalex.org/I190632392"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Dan Harnesk","raw_affiliation_strings":["Lule\u00e5 University of Technology, Sweden"],"affiliations":[{"raw_affiliation_string":"Lule\u00e5 University of Technology, Sweden","institution_ids":["https://openalex.org/I190632392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087150169","display_name":"Heidi Hartikainen","orcid":"https://orcid.org/0000-0002-1215-6745"},"institutions":[{"id":"https://openalex.org/I190632392","display_name":"Lule\u00e5 University of Technology","ror":"https://ror.org/016st3p78","country_code":"SE","type":"education","lineage":["https://openalex.org/I190632392"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Heidi Hartikainen","raw_affiliation_strings":["Lule\u00e5 University of Technology, Sweden"],"affiliations":[{"raw_affiliation_string":"Lule\u00e5 University of Technology, Sweden","institution_ids":["https://openalex.org/I190632392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027731087"],"corresponding_institution_ids":["https://openalex.org/I190632392"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13379918,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3","issue":"2","first_page":"1","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11024","display_name":"Information Systems Theories and Implementation","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/emergency-response","display_name":"Emergency response","score":0.61934494972229},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5868015289306641},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5852006673812866},{"id":"https://openalex.org/keywords/association","display_name":"Association (psychology)","score":0.5301892161369324},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5294095277786255},{"id":"https://openalex.org/keywords/meaning","display_name":"Meaning (existential)","score":0.5262740850448608},{"id":"https://openalex.org/keywords/mainstream","display_name":"Mainstream","score":0.5258824229240417},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49225106835365295},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4649575650691986},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.462380588054657},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.4583345055580139},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.42817291617393494},{"id":"https://openalex.org/keywords/emergency-management","display_name":"Emergency management","score":0.42624717950820923},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3563781976699829},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.3170158267021179},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.17387348413467407},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.17064359784126282},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.1632186770439148},{"id":"https://openalex.org/keywords/medical-emergency","display_name":"Medical emergency","score":0.15016496181488037},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.1485215127468109},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09457316994667053}],"concepts":[{"id":"https://openalex.org/C3017997152","wikidata":"https://www.wikidata.org/wiki/Q814610","display_name":"Emergency response","level":2,"score":0.61934494972229},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5868015289306641},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5852006673812866},{"id":"https://openalex.org/C142853389","wikidata":"https://www.wikidata.org/wiki/Q744778","display_name":"Association (psychology)","level":2,"score":0.5301892161369324},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5294095277786255},{"id":"https://openalex.org/C2780876879","wikidata":"https://www.wikidata.org/wiki/Q3054749","display_name":"Meaning (existential)","level":2,"score":0.5262740850448608},{"id":"https://openalex.org/C2777617010","wikidata":"https://www.wikidata.org/wiki/Q18957","display_name":"Mainstream","level":2,"score":0.5258824229240417},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49225106835365295},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4649575650691986},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.462380588054657},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.4583345055580139},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.42817291617393494},{"id":"https://openalex.org/C62555980","wikidata":"https://www.wikidata.org/wiki/Q1460420","display_name":"Emergency management","level":2,"score":0.42624717950820923},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3563781976699829},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.3170158267021179},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.17387348413467407},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.17064359784126282},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.1632186770439148},{"id":"https://openalex.org/C545542383","wikidata":"https://www.wikidata.org/wiki/Q2751242","display_name":"Medical emergency","level":1,"score":0.15016496181488037},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.1485215127468109},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09457316994667053},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jiscrm.2011040101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jiscrm.2011040101","pdf_url":null,"source":{"id":"https://openalex.org/S4394735749","display_name":"International Journal of Information Systems for Crisis Response and Management","issn_l":"1937-9420","issn":["1937-9420"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Systems for Crisis Response and Management","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jiscra:v:3:y:2011:i:2:p:1-17","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jiscrm.2011040101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W181997537","https://openalex.org/W1527515588","https://openalex.org/W1532234446","https://openalex.org/W1532291631","https://openalex.org/W1558171572","https://openalex.org/W1559155956","https://openalex.org/W1955916110","https://openalex.org/W1966669815","https://openalex.org/W1971368595","https://openalex.org/W1971422931","https://openalex.org/W1974029860","https://openalex.org/W1992657524","https://openalex.org/W1997603734","https://openalex.org/W2006720726","https://openalex.org/W2029826216","https://openalex.org/W2035127229","https://openalex.org/W2053981852","https://openalex.org/W2054994890","https://openalex.org/W2058909888","https://openalex.org/W2075418818","https://openalex.org/W2083647163","https://openalex.org/W2089773578","https://openalex.org/W2091494072","https://openalex.org/W2091722922","https://openalex.org/W2093310734","https://openalex.org/W2096166601","https://openalex.org/W2104476183","https://openalex.org/W2109172569","https://openalex.org/W2118742042","https://openalex.org/W2127281374","https://openalex.org/W2141031703","https://openalex.org/W2143915709","https://openalex.org/W2149635452","https://openalex.org/W2154843660","https://openalex.org/W2155620087","https://openalex.org/W2155907095","https://openalex.org/W2162360265","https://openalex.org/W2164242309","https://openalex.org/W2165042656","https://openalex.org/W2171612225","https://openalex.org/W2182158417","https://openalex.org/W2750641468","https://openalex.org/W2773411043","https://openalex.org/W2895496587","https://openalex.org/W2992230590","https://openalex.org/W3124186914","https://openalex.org/W3126134162","https://openalex.org/W4285719527","https://openalex.org/W4388174267","https://openalex.org/W6631931628"],"related_works":["https://openalex.org/W2120971814","https://openalex.org/W2508914475","https://openalex.org/W4310892428","https://openalex.org/W4293770853","https://openalex.org/W2356973015","https://openalex.org/W2777401565","https://openalex.org/W2033357182","https://openalex.org/W2248314326","https://openalex.org/W4390655704","https://openalex.org/W2303053547"],"abstract_inverted_index":{"This":[0,40],"paper":[1,41],"draws":[2],"on":[3,52,74,88,102],"the":[4,13,23,43,46,53,62,70,103,111],"socio-technical":[5],"research":[6],"tradition":[7],"in":[8,16,120],"information":[9,14,89,114,130],"systems":[10],"to":[11,99,110],"re-conceptualize":[12],"security":[15,115],"emergency":[17,47,63,82,91,95,121],"response.":[18],"A":[19],"conceptual":[20],"basis":[21],"encompassing":[22],"three":[24,81],"layers\u2014technical,":[25],"cognitive,":[26],"and":[27,35,57,66,94],"organizational\u2014is":[28],"developed":[29],"by":[30],"synthesizing":[31],"Actor":[32],"Network":[33],"Theory":[34,36],"of":[37,129],"Organizational":[38],"Routines.":[39],"makes":[42],"assumption":[44],"that":[45,113,123],"response":[48,122],"context":[49],"is":[50,72,97,124],"built":[51],"relationship":[54],"between":[55],"association":[56],"connectivity,":[58],"which":[59],"continuously":[60],"shapes":[61],"action":[64],"network":[65],"its":[67],"routines.":[68],"Empirically,":[69],"analysis":[71],"based":[73],"a":[75,118],"single":[76],"case":[77],"study":[78],"conducted":[79],"across":[80],"departments.":[83],"The":[84,106],"data":[85],"thus":[86],"collected":[87],"security,":[90],"department":[92],"routines,":[93],"actions":[96],"used":[98],"theorize":[100],"specifically":[101],"association/connectivity":[104],"relationship.":[105],"resultant":[107],"findings":[108],"point":[109],"fact":[112],"layers":[116],"have":[117],"meaning":[119],"different":[125],"from":[126],"mainstream":[127],"definitions":[128],"security.":[131]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
