Reference Hub9
When and How (Not) to Trust It? Supporting Virtual Emergency Teamwork

When and How (Not) to Trust It? Supporting Virtual Emergency Teamwork

Monika Büscher, Preben Holst Mogensen, Margit Kristensen
Copyright: © 2009 |Volume: 1 |Issue: 2 |Pages: 15
ISSN: 1937-9390|EISSN: 1937-9420|ISSN: 1937-9390|EISBN13: 9781615203383|EISSN: 1937-9420|DOI: 10.4018/jiscrm.2009040101
Cite Article Cite Article

MLA

Büscher, Monika, et al. "When and How (Not) to Trust It? Supporting Virtual Emergency Teamwork." IJISCRAM vol.1, no.2 2009: pp.1-15. http://doi.org/10.4018/jiscrm.2009040101

APA

Büscher, M., Holst Mogensen, P., & Kristensen, M. (2009). When and How (Not) to Trust It? Supporting Virtual Emergency Teamwork. International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 1(2), 1-15. http://doi.org/10.4018/jiscrm.2009040101

Chicago

Büscher, Monika, Preben Holst Mogensen, and Margit Kristensen. "When and How (Not) to Trust It? Supporting Virtual Emergency Teamwork," International Journal of Information Systems for Crisis Response and Management (IJISCRAM) 1, no.2: 1-15. http://doi.org/10.4018/jiscrm.2009040101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this article we use the formative evaluation of a prototype ‘assembly’ of pervasive computing technologies to specify design implications for emergency virtual teamwork tools. The prototype assembly, called “Overview”, was implemented in collaboration with police, fire and medical emergency services as part of the real life event management during the Tall Ships’ Races 2007 in Denmark. We describe how the emergency teams used the technologies for collaboration between distributed colleagues, to produce shared situation awareness, to manage efforts and resources and respond to minor emergencies. Trust in technology is a key need virtual teams identify in their endeavours to dovetail innovative technologies into emergency work. We show how practices of working up trust are supported by the PalCom open architecture (which was used to build Overview), and delineate design guidelines to enable the productive integration of pervasive computing.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.