<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>     caa a22        4500</leader>
  <controlfield tag="001">60622856X</controlfield>
  <controlfield tag="003">CHVBK</controlfield>
  <controlfield tag="005">20210128101204.0</controlfield>
  <controlfield tag="007">cr unu---uuuuu</controlfield>
  <controlfield tag="008">210128e20150201xx      s     000 0 eng  </controlfield>
  <datafield tag="024" ind1="7" ind2="0">
   <subfield code="a">10.1007/s10796-014-9515-4</subfield>
   <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(NATIONALLICENCE)springer-10.1007/s10796-014-9515-4</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
   <subfield code="a">Repertoires of collaboration for common operating pictures of disasters and extreme events</subfield>
   <subfield code="h">[Elektronische Daten]</subfield>
   <subfield code="c">[Deborah Bunker, Linda Levine, Carol Woody]</subfield>
  </datafield>
  <datafield tag="520" ind1="3" ind2=" ">
   <subfield code="a">Disasters are dynamic, emergent scenarios involving diverse stakeholders in complex decision making and as such, disaster response systems must account for these conditions. We suggest that emergency service agencies should consider supplementing their traditional command and control approaches and common operating pictures (COP), with purposeful collaborative approaches. These would facilitate the generation of common operating pictures incorporating dynamic and emergent characteristics, providing a range of options with which to better respond to disasters. Collaborative management and negotiated integration of information represent a paradigmatic shift in our thinking about disaster response. We have utilized McCann's (1983) Social Problem Solving Negotiated Arrangements (SPS-NA) to highlight problems with conventional approaches during three disaster scenarios. As a result of lessons learned from this analysis we suggest that developing supplementary repertoires of collaboration would have a positive impact on improved COP for effective disaster response outcomes.</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
   <subfield code="a">Springer Science+Business Media New York, 2014</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Common operating pictures</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Disaster response</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Collaboration</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Negotiated arrangements</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2="7">
   <subfield code="a">Extreme events</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Bunker</subfield>
   <subfield code="D">Deborah</subfield>
   <subfield code="u">Discipline of Business Information Systems, University of Sydney, Sydney, Australia</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Levine</subfield>
   <subfield code="D">Linda</subfield>
   <subfield code="u">Independent Researcher Consultant &amp; Research Fellow, University of Sydney, Pittsburgh, PA, USA</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Woody</subfield>
   <subfield code="D">Carol</subfield>
   <subfield code="u">Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="773" ind1="0" ind2=" ">
   <subfield code="t">Information Systems Frontiers</subfield>
   <subfield code="d">Springer US; http://www.springer-ny.com</subfield>
   <subfield code="g">17/1(2015-02-01), 51-65</subfield>
   <subfield code="x">1387-3326</subfield>
   <subfield code="q">17:1&lt;51</subfield>
   <subfield code="1">2015</subfield>
   <subfield code="2">17</subfield>
   <subfield code="o">10796</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="u">https://doi.org/10.1007/s10796-014-9515-4</subfield>
   <subfield code="q">text/html</subfield>
   <subfield code="z">Onlinezugriff via DOI</subfield>
  </datafield>
  <datafield tag="898" ind1=" " ind2=" ">
   <subfield code="a">BK010053</subfield>
   <subfield code="b">XK010053</subfield>
   <subfield code="c">XK010000</subfield>
  </datafield>
  <datafield tag="900" ind1=" " ind2="7">
   <subfield code="a">Metadata rights reserved</subfield>
   <subfield code="b">Springer special CC-BY-NC licence</subfield>
   <subfield code="2">nationallicence</subfield>
  </datafield>
  <datafield tag="908" ind1=" " ind2=" ">
   <subfield code="D">1</subfield>
   <subfield code="a">research-article</subfield>
   <subfield code="2">jats</subfield>
  </datafield>
  <datafield tag="949" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="F">NATIONALLICENCE</subfield>
   <subfield code="b">NL-springer</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="P">856</subfield>
   <subfield code="E">40</subfield>
   <subfield code="u">https://doi.org/10.1007/s10796-014-9515-4</subfield>
   <subfield code="q">text/html</subfield>
   <subfield code="z">Onlinezugriff via DOI</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="P">700</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Bunker</subfield>
   <subfield code="D">Deborah</subfield>
   <subfield code="u">Discipline of Business Information Systems, University of Sydney, Sydney, Australia</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="P">700</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Levine</subfield>
   <subfield code="D">Linda</subfield>
   <subfield code="u">Independent Researcher Consultant &amp; Research Fellow, University of Sydney, Pittsburgh, PA, USA</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="P">700</subfield>
   <subfield code="E">1-</subfield>
   <subfield code="a">Woody</subfield>
   <subfield code="D">Carol</subfield>
   <subfield code="u">Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA</subfield>
   <subfield code="4">aut</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="B">NATIONALLICENCE</subfield>
   <subfield code="P">773</subfield>
   <subfield code="E">0-</subfield>
   <subfield code="t">Information Systems Frontiers</subfield>
   <subfield code="d">Springer US; http://www.springer-ny.com</subfield>
   <subfield code="g">17/1(2015-02-01), 51-65</subfield>
   <subfield code="x">1387-3326</subfield>
   <subfield code="q">17:1&lt;51</subfield>
   <subfield code="1">2015</subfield>
   <subfield code="2">17</subfield>
   <subfield code="o">10796</subfield>
  </datafield>
 </record>
</collection>
