Submitted:
18 February 2026
Posted:
26 February 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
- Legal: do regulations and enforcement practice allow replacing or at least supplementing paper documents with a digital operational layer?
- Technological: how to ensure reliable access during outages (power, connectivity) and under degraded conditions?
- Security: how to mitigate misuse and deception (e.g., quishing), and how to preserve integrity and trust?
2. Materials and Methods
2.1. Search Strategy and Selection
2.2. Inclusion and Exclusion Criteria
2.3. Methodological Limitations
3. Results: Legal and Regulatory Context
3.1. Poland: Interpretive Legal Assessment
- No explicit medium is defined: the regulation emphasizes possession and accessibility, not a mandatory paper-only form.
- Enforcement practice strengthens paper’s evidentiary role: in routine compliance audits and documentation workflows, a physical document with clear authenticity cues (signatures, revision dates) remains the default evidentiary artifact; therefore, paper functions as the master document for accountability and archiving, while the digital layer is best treated as a controlled operational copy/overlay.
- Hybrid model as conservative compliance: since copying is not prohibited, a digital operational overlay (e.g., via QR codes at controlled access points) is not expressly prohibited, provided it does not eliminate the paper master expected in practice.
3.2. European Comparative Perspective
3.3. Synthesis: Principle of Dual Availability
- Material availability (paper fallback): a paper master document stored at a predictable, secure location (e.g., metal cabinet or deposit box) ensures access under infrastructure degradation (blackout, network failure, mechanical damage).
- Operational availability (digital overlay): e-FSi provides rapid access to a minimal operational subset in the initial phase, e.g., via QR codes.
4. Results: Technological and Human Factors Framework
4.1. Availability and Reliability Requirements
4.2. Distribution Channels: QR as an Entry Point
- Early access point (design recommendation): gate/entrance/guardhouse—where reconnaissance often begins before entering the building; in practice, the tag should be placed on the inside of the gate/perimeter fence (out of sight to passers-by) but reachable from the public side without delaying entry, following predictable placement conventions used for safety information and evacuation signage (e.g., ISO 23601) [18], while employing weather-resistant materials and anti-tamper mounting to risks.
- Confirmation/documentation point: near the paper master (cabinet/deposit box) to explicitly bind digital content to the master document and its revision control.
4.3. Access Architectures: PDF vs. Native App vs. PWA
- Static PDF is simple to distribute but weak in change management: parallel versions proliferate, and usability under stress is limited.
- PWA offers a practical compromise: browser-based access with offline capability via Service Worker and caching APIs [23,24,25,26]. This enables an offline-first design where the minimal critical dataset is available even without network connectivity, provided that caching, update policies, and version governance are explicitly engineered and tested. In this review, the PWA argument is treated as a trade-off analysis: PWAs reduce installation friction (“zero-install”) but introduce specific operational and security requirements (Service Worker scope control, cache integrity, rollback strategy) that must be managed.
| Criterion | Paper (Master) | PDF (Static) | Native App | PWA (Offline-First) |
|---|---|---|---|---|
| “Zero-install” | n/a | High (if locally stored) | Low | High |
| Offline operation | High | Variable | High | High (Service Worker + cache) |
| Update control | Manual | High divergence risk | Controlled, but store/MDM dependent | Controlled (versioning + cache strategy) |
| Usability under stress | Low–medium | Low–medium | Variable | High if UI is optimized |
| Resilience to connectivity loss | High | Variable | High | High |
| Change auditability | Medium (signatures/dates) | Low–medium | Medium–high | Potentially high (logs, versions) |
| Key technical risks | Low | Medium | Medium–high | Medium |
4.4. Human Factors: Designing for Incident Commanders and Firefighters
5. Results: Minimum Operational Dataset (MOD)
5.1. Definition and Role in the Hybrid Model
5.2. Layered Structure: MOD Levels 0–2
- MOD Level 0 (critical; early phase): utility shut-offs, high-risk zones, external hydrants/water sources, essential access/orientation cues—deterministically available offline.
- MOD Level 1 (tactical; subsequent phase): simplified floor/fire compartment plans, fire safety systems overview and control logic, technical rooms, key access information, contacts.
- MOD Level 2 (reference; extended operations): detailed schematics, SDS/chemical details, deeper technical documentation—possibly document-style but indexed.
| Information Domain | Level 0 (Critical) | Level 1 (Tactical) | Level 2 (Reference) | Preferred Format |
|---|---|---|---|---|
| Access & ID | address, entrances, early QR point | access map, deposit points | detailed documents | card + map |
| Water | hydrants/sources | FDC/pumps/valves | calculations/parameters | map + schematic |
| Utilities | main shut-offs | switch rooms/technical spaces | installation schematics | list + schematic |
| Special hazards | key hazard zones | quantities/locations | SDS/procedures | icons + links (using standardized emergency symbols where feasible) [47] |
| Building layout | simple orientation sketch | simplified floor/zone plans | technical drawings | layered map |
| Fire safety systems | control panels locations | control dependencies | full documentation | card + diagram |
| Contacts | 24/7 functional number | roles list | responsibilities | card |
| Constraints | stable “no-go” hazards | access restrictions | structural/engineering data | card + links |
5.3. Proposed MOD Content Categories
6. Results: Security, Privacy, and Risk Management
6.1. Security Objectives and Protected Assets
6.2. Quishing and Physical Manipulation of QR Codes
- Tamper resistance: metal plates, anti-tamper fasteners, tamper-evident labels (“VOID”), placement within CCTV coverage, and scheduled physical inspections.
- Reducing QR “power”: encode a building identifier rather than a full URL; force access through a fixed, known domain (allow-listing).
- User-visible verification: show the destination domain and building ID before loading detailed content; warn on redirects outside trusted domains.
- Controlled redundancy: multiple QR points improve availability but increase attack surface; mitigate by content segmentation (gate: Level 0; cabinet: Level 1–2) and inspection procedures.
6.3. PWA Risks: Service Worker Persistence and Cache Integrity
- Minimize attack surface: avoid third-party scripts; minimize dependencies; constrain Service Worker scope.
- Enforce integrity: strong CSP, Subresource Integrity (SRI) for static assets, strict HTTPS/HSTS.
- Manage staleness: explicit revision numbers aligned with the paper master, TTL policies, and clear “last updated” indicators.
- Rollback/kill switch: capability to quickly withdraw a faulty version while preserving minimal critical access.
6.4. Privacy and Sensitive Information Exposure
| RISK AREA | Mechanism | Operational Impact | Example Mitigations |
|---|---|---|---|
| Quishing / QR replacement | sticker overlay, malicious redirect | disinformation, delay, data theft | tamper-evident labels, inspections, allow-listed domain, QR as ID (not URL), Level 0 vs 1–2 separation |
| Content spoofing | fake domain/DNS/rehosting | wrong decisions, loss of trust | fixed domain, HTTPS/HSTS, verifiable versions, redirect restrictions |
| PWA/Service Worker abuse | persistence, SW-XSS | offline disinformation | CSP/SRI, minimized dependencies, constrained scope, controlled update/rollback |
| Cache availability/staleness | cache poisoning, poor caching strategy | outage or outdated data | versioned cache, TTL, explicit revision display, controlled degradation |
| Confidentiality exposure | excessive Level 1–2 access | physical security risk, compliance issues | content segmentation, on-site second factor, minimization, audit |
7. Discussion
7.1. Positioning Within Pre-Incident Planning and Building Intelligence Research
7.2. Limits of Fully Paperless Models and the Rationale for Redundancy
7.3. MOD as an Interoperability and Coordination Mechanism
7.4. Effectiveness Metrics and Evaluation Design
7.5. Limitations and Future Research
8. Conclusions
References
- Grant, M.J.; Booth, A. A typology of reviews: An analysis of 14 review types and associated methodologies. Health Inf. Libr. J. 2009, 26, 91–108. [Google Scholar] [CrossRef]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Hoffmann, T.C.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef]
- Baethge, C.; Goldbeck-Wood, S.; Mertens, S. SANRA—A scale for the quality assessment of narrative review articles. Res. Integr. Peer Rev. 2019, 4, 5. [Google Scholar] [CrossRef] [PubMed]
- Minister Spraw Wewnętrznych i Administracji. Rozporządzenie z Dnia 7 Czerwca 2010 r. w Sprawie Ochrony Przeciwpożarowej Budynków, Innych Obiektów Budowlanych i Terenów (Dz.U. 2010 poz. 719, z późn. zm.). Available online: https://api.sejm.gov.pl/eli/acts/DU/2010/719/text.pdf (accessed on 14 December 2025).
- NFPA 1620:2020; Standard for Pre-Incident Planning. NFPA: Quincy, MA, USA, 2020.
- Li, N.; Yang, Z.; Ghahramani, A.; Becerik-Gerber, B.; Soibelman, L. Situational awareness for supporting building fire emergency response: Information needs, information sources, and implementation requirements. Fire Saf. J. 2014, 63, 17–28. [Google Scholar] [CrossRef]
- European Union. Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market (eIDAS). Off. J. Eur. Union 2014, L 257/73, 73–114. Available online: https://eur-lex.europa.eu/eli/reg/2014/910/oj (accessed on 10 January 2026).
- DIN 14095:2025-07; Feuerwehrpläne für Bauliche Anlagen. DIN: Berlin, Germany, 2025. [CrossRef]
- Ministère de la Culture (France). Les Plans ETARE (Plans à Destination des Services de Secours). Available online: https://www.culture.gouv.fr/Thematiques/Monuments-Sites/Intervenir-en-cas-de-sinistre/Les-plans-Eta.-Re. (accessed on 18 January 2026).
- Royaume de Belgique. Arrêté Royal du 28 Mars 2014 Relatif à la Prévention de l’incendie sur les Lieux de Travail, Art. 22 (Dossier d’intervention). Available online: https://www.ejustice.just.fgov.be/cgi_loi/change_lg.pl?language=fr&la=F&cn=2014032818&table_name=loi (accessed on 24 January 2026).
- Magyarország. 54/2014. (XII. 5.) BM Rendelet az Országos Tűzvédelmi Szabályzatról (OTSZ). Nemzeti Jogszabálytár. Available online: https://njt.hu/jogszabaly/2014-54-20-0A (accessed on 25 January 2026).
- Vereinigung zur Förderung des Deutschen Brandschutzes e.V. (vfdb). Technischer Bericht TB 07-01: Leitfaden zur Erstellung von Georeferenzierten Feuerwehrplänen; Ausgabe September 2024; vfdb: Germany. 2024; Available online: https://www.vfdb.de/media/doc/technischeberichte/TB_07-01_Technischer_Bericht_georeferenzierte_Feuerwehrplaene.pdf (accessed on 31 January 2026).
- Service Départemental-Métropolitain d’incendie et de Secours de la Loire (SDIS 42). Guichet Sécurité—Plan ETARE (incl. Fiche n°8). Available online: https://www.sdis42.fr/guichet-s%C3%A9curit%C3%A9/formulaire/plan-etare (accessed on 31 January 2026).
- Service Public Fédéral (SPF) Emploi; Travail et Concertation Sociale (Belgium). Dossier d’intervention Incendie (art. 22, AR 28 mars 2014): Contenu Minimal et Modalités. Available online: https://emploi.belgique.be/fr/themes/bien-etre-au-travail/politique-de-prevention/incendie-et-explosion/dossier (accessed on 1 February 2026).
- Roy, J.M. Preincident Plan Accessibility: An Ongoing Issue; Executive Fire Officer Program Paper; National Fire Academy/FEMA: Emmitsburg, MD, USA, 2010. [Google Scholar]
- ISO 22320:2018; Security and Resilience—Emergency Management—Guidelines for Incident Management. ISO: Geneva, Switzerland, 2018.
- ISO/IEC 18004:2024; Information Technology—Automatic Identification and Data Capture Techniques—QR Code Bar Code Symbology Specification. ISO: Geneva, Switzerland, 2024.
- ISO 23601:2009; Safety Identification—Escape and Evacuation Plan Signs. ISO: Geneva, Switzerland, 2009.
- Rieger, C.; Majchrzak, T.A. Towards the definitive evaluation framework for cross-platform app development approaches. J. Syst. Softw. 2019, 153, 175–199. [Google Scholar] [CrossRef]
- Harris, M.A.; Brookshire, R.; Chin, A.G. Identifying factors influencing consumers’ intent to install mobile applications. Int. J. Inf. Manag. 2016, 36, 441–450. [Google Scholar] [CrossRef]
- Apple. Distribute Managed Apps to Apple Devices (Apple Platform Deployment). Available online: https://support.apple.com/guide/deployment/ (accessed on 7 February 2026).
- Google. Manage and Distribute Apps (Managed Google Play/EMM API). Available online: https://developers.google.com/android/managed-google-play (accessed on 7 February 2026).
- World Wide Web Consortium (W3C). Service Workers 1; W3C Candidate Recommendation Draft; W3C: 26 January 2026. Available online: https://www.w3.org/TR/service-workers/ (accessed on 8 February 2026).
- MDN Web Docs. Service Worker API (Concepts, Lifecycle, Offline and Caching Capabilities). Available online: https://developer.mozilla.org/en-US/docs/Web/API/Service_Worker_API (accessed on 8 February 2026).
- Google web.dev. Common Techniques to Build Offline Applications (Service Worker Caching Patterns). Available online: https://web.dev/articles/offline-cookbook (accessed on 8 February 2026).
- Microsoft. Progressive Web Apps (PWA) Documentation (incl. Offline-Capable Patterns and Deployment Guidance). Available online: https://learn.microsoft.com/en-us/microsoft-edge/progressive-web-apps/how-to/ (accessed on 8 February 2026).
- ISO 9241-210:2019; Ergonomics of Human-System Interaction—Part 210: Human-Centred Design for Interactive Systems. ISO: Geneva, Switzerland, 2019.
- Khanlari, P.; Ghasemi, F.; Heidarimoghdam, R. Protective gloves, hand grip strength, and dexterity tests: A comprehensive study. Heliyon 2023, 9, e13592. [Google Scholar] [CrossRef]
- World Wide Web Consortium (W3C). Web Content Accessibility Guidelines (WCAG) 2.2; W3C Recommendation, 2023. Available online: https://www.w3.org/TR/WCAG22/ (accessed on 20 December 2025).
- World Wide Web Consortium (W3C). Web Content Accessibility Guidelines (WCAG) 2.2: Understanding Success Criterion 2.5.8 Target Size (Minimum); W3C Recommendation, 2023. Available online: https://www.w3.org/TR/WCAG22/#target-size-minimum (accessed on 20 December 2025).
- Google. Android Accessibility: Touch Target Size (Guidelines). Available online: https://support.google.com/accessibility/android/answer/7101858 (accessed on 21 December 2025).
- Material Design (Google). Accessibility Guidance (incl. Touch Target Recommendations). Available online: https://m2.material.io/design/usability/accessibility.html (accessed on 21 December 2025).
- Endsley, M.R. Toward a theory of situation awareness in dynamic systems. Hum. Factors 1995, 37, 32–64. [Google Scholar] [CrossRef]
- Klein, G. Sources of Power: How People Make Decisions; MIT Press: Cambridge, MA, USA, 1998. [Google Scholar]
- Sweller, J. Cognitive load during problem solving: Effects on learning. Cogn. Sci. 1988, 12, 257–285. [Google Scholar] [CrossRef]
- Shneiderman, B. The eyes have it: A task by data type taxonomy for information visualizations. In Proceedings of the 1996 IEEE Symposium on Visual Languages, Boulder, CO, USA, 3–6 September 1996; IEEE: Washington, DC, USA, 1996; pp. 336–343. [Google Scholar] [CrossRef]
- Pirolli, P.; Card, S. Information foraging in information access environments. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’95); ACM: New York, NY, USA, 1995; pp. 51–58. [Google Scholar] [CrossRef]
- Pirolli, P.; Card, S. Information foraging. Psychol. Rev. 1999, 106, 643–675. [Google Scholar] [CrossRef]
- Jones, W.W.; Holmberg, D.G.; Davis, W.D.; Bushby, S.T.; Reed, K.A. Workshop to Define Information Needed by Emergency Responders During Building Emergencies; NISTIR 7193; NIST: Gaithersburg, MD, USA, 2005. [Google Scholar] [CrossRef]
- Holmberg, D.G.; Raymond, M.A.; Averill, J.D. Delivering Building Intelligence to First Responders; NIST Technical Note 1648; NIST: Gaithersburg, MD, USA, 2013. [Google Scholar] [CrossRef]
- Averill, J.D.; Holmberg, D.G.; Vinh, A.B.; Davis, W.D. Building Information Exchange for Fire Responders Workshop: Proceedings; NIST Technical Note 1643; NIST: Gaithersburg, MD, USA, 2010. [Google Scholar]
- Seppänen, H.; Mäkelä, J.; Luokkala, P.; Virrantaus, K. Developing shared situational awareness for emergency management. Saf. Sci. 2013, 55, 1–9. [Google Scholar] [CrossRef]
- NFPA 1660:2024; Standard for Emergency, Continuity, and Crisis Management: Preparedness, Response, and Recovery. NFPA: Quincy, MA, USA, 2024.
- NFPA 170:2024; Standard for Fire Safety and Emergency Symbols. NFPA: Quincy, MA, USA, 2024.
- Okoli, J.O.; Weller, G.; Watt, J. Information processing and intuitive decision-making on the fireground: The role of working memory, situation awareness, and experience. Cogn. Technol. Work 2016, 18, 89–103. [Google Scholar] [CrossRef]
- Rezaeifam, S.; Ergen, E.; Günaydın, H.M. Fire emergency response systems information requirements’ data model for situational awareness of responders: A goal-directed task analysis. J. Build. Eng. 2023, 63, 105531. [Google Scholar] [CrossRef]
- ISO 7010:2019; Graphical Symbols—Safety Colours and Safety Signs—Registered Safety Signs. ISO: Geneva, Switzerland, 2019.
- Vidas, T.; Owusu, E.; Wang, S.; Zeng, C.; Cranor, L.F.; Christin, N. QRishing: The susceptibility of smartphone users to QR code phishing attacks. In Financial Cryptography and Data Security (FC 2013); LNCS 7862; Sadeghi, A.-R., Ed.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 52–69. [Google Scholar] [CrossRef]
- Kieseberg, P.; Leithner, M.; Mulazzani, M.; Munroe, C.; Schrittwieser, S.; Sinha, A.; Weippl, E.R. QR code security: A survey of attacks and challenges for usable security. In Human Aspects of Information Security, Privacy, and Trust (HAS 2014); LNCS 8533; Tryfonas, T., Askoxylakis, I., Eds.; Springer: Cham, Switzerland, 2014; pp. 79–90. [Google Scholar] [CrossRef]
- Sharevski, F.; Devine, A.; Pieroni, E.; Jachim, P. Phishing with malicious QR codes. In Proceedings of the European Symposium on Usable Security (EuroUSEC 2022), Rennes, France, 18 April 2022; ACM: New York, NY, USA, 2022; pp. 160–171. [Google Scholar] [CrossRef]
- Kumar, N.; Jain, S.; Kaulgud, V. How safe is QR code? Understanding user awareness and perception toward QR code security. In HCI International 2022; Springer: Cham, Switzerland, 2022. [Google Scholar] [CrossRef]
- Cybersecurity and Infrastructure Security Agency (CISA). Phishing Guidance: Stopping the Attack Cycle at Phase One; CISA: Washington, DC, USA, 2023. Available online: https://www.cisa.gov/resources-tools/resources/phishing-guidance-stopping-attack-cycle-phase-one (accessed on 27 December 2025).
- U.S. Department of Health and Human Services (HHS); Health Sector Cybersecurity Coordination Center (HC3). QR Codes and Phishing as a Threat to the HPH Sector; HC3: Washington, DC, USA, 2023. Available online: https://www.hhs.gov/sites/default/files/qr-codes-and-phishing-as-a-threat-to-the-hph-white-paper.pdf (accessed on 27 December 2025).
- Federal Bureau of Investigation (FBI); Internet Crime Complaint Center (IC3). North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing Campaigns Targeting U.S. Entities; FLASH Report No. CP-000111-MW; 8 January 2026. Available online: https://www.ic3.gov/CSA/2026/260108.pdf (accessed on 14 February 2026).
- ISO/IEC 20248:2018; Information Technology—Automatic Identification and Data Capture Techniques—Data Structures for Barcode and Two-Dimensional Symbol Authenticity and Traceability. ISO: Geneva, Switzerland, 2018.
- El-Ansari, A.; Hallynck, M.; Lison, P. Quick Response Code Secure: A Cryptographically Secure Anti-Phishing and Anti-Tampering Client-Server Based Solution. In Information Systems Security and Privacy (ICISSP 2018); Springer: Cham, Switzerland, 2018. [Google Scholar] [CrossRef]
- Focardi, R.; Luccio, F.L.; Wahsheh, H.A.M. Usable Cryptographic QR Codes. In Proceedings of the 2018 IEEE International Conference on Industrial Technology (ICIT 2018), Lyon, France, 20–22 February 2018; IEEE: Piscataway, NJ, USA, 2018. [Google Scholar] [CrossRef]
- Chinprutthiwong, P.; Vardhan, R.; Yang, G.; Zhang, Y.; Gu, G. The service worker hiding in your browser: The next web attack target? In Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2021), San Sebastián, Spain, 6–8 October 2021; ACM: New York, NY, USA, 2021; pp. 312–323. [Google Scholar] [CrossRef]
- Chinprutthiwong, P.; Vardhan, R.; Yang, G.; Gu, G. Security study of service worker cross-site scripting. In Proceedings of the Annual Computer Security Applications Conference (ACSAC 2020), Virtual Event, 7–11 December 2020; ACM: New York, NY, USA, 2020; pp. 643–654. [Google Scholar] [CrossRef]
- Karami, S.; Ilia, P.; Polakis, J. Awakening the Web’s sleeper agents: Misusing service workers for privacy leakage. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2021), Virtual Event, 21–25 February 2021; Internet Society: Reston, VA, USA, 2021. [Google Scholar] [CrossRef]
- Nguyen, H.V.; Iacono, L.L.; Federrath, H. Your cache has fallen: Cache-poisoned denial-of-service attack. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS 2019), London, UK, 11–15 November 2019; ACM: New York, NY, USA, 2019; pp. 1915–1936. [Google Scholar] [CrossRef]
- European Union. Regulation (EU) 2016/679 (General Data Protection Regulation, GDPR). Off. J. Eur. Union 2016, L 119/1, 1–88. Available online: https://eur-lex.europa.eu/legal-content/PL/TXT/?uri=CELEX:32016R0679 (accessed on 11 January 2026).
- European Union. Directive (EU) 2022/2555 (NIS2 Directive). Off. J. Eur. Union 2022, L 333/80, 80–152. Available online: https://eur-lex.europa.eu/eli/dir/2022/2555/oj/eng (accessed on 11 January 2026).
- European Union Agency for Cybersecurity (ENISA). ENISA Threat Landscape 2025; ENISA: Athens/Heraklion, Greece, 2025; Available online: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2025 (accessed on 15 February 2026).
- Souppaya, M.; Kent, K. Guide to Computer Security Log Management; NIST Special Publication 800-92; NIST: Gaithersburg, MD, USA, 2006. [Google Scholar] [CrossRef]
- Reason, J. Human error: Models and management. BMJ 2000, 320, 768–770. [Google Scholar] [CrossRef] [PubMed]
- Tissington, P.A.; Flin, R. Assessing risk in dynamic situations: Lessons from fire service operations. Risk Manag. 2005, 7, 43–51. [Google Scholar] [CrossRef]
- Steen-Tveit, K.; Munkvold, B.E. From common operational picture to common situational understanding: An analysis based on practitioner perspectives. Saf. Sci. 2021, 142, 105381. [Google Scholar] [CrossRef]
- Bharosa, N.; Lee, J.; Janssen, M. Challenges and obstacles in sharing and coordinating information during multi-agency disaster response: Propositions from field exercises. Inf. Syst. Front. 2010, 12, 49–65. [Google Scholar] [CrossRef]
- Bunker, D.; Levine, L.; Woody, C. Repertoires of collaboration for common operating pictures of disasters and extreme events. Inf. Syst. Front. 2015, 17, 51–65. [Google Scholar] [CrossRef]
- Weidinger, J.; Schlauderer, S.; Overhage, S. Determinants for the acceptance of emergency response information systems: Analyses with German firefighters. Int. J. Disaster Risk Reduct. 2024, 109, 104603. [Google Scholar] [CrossRef]
| Country | Document (Equivalent) | Medium Requirement in Practice | Status of Electronic Version | Primary Legal/Operational Risk |
|---|---|---|---|---|
| PL | Fire safety instructions (IBP) | Not defined explicitly; typically paper | Acceptable as copy/operational overlay | Content divergence between paper and digital |
| DE | Fire brigade plans (Feuerwehrpläne) | Strongly standardized; paper on site, CAD upstream | Common supplemental channel | Symbol/format compliance with DIN 14095 |
| FR | Intervention plan (ERP/other regimes) | Physical plan at defined locations | Central systems (e.g., ETARE) as complement | Dependence on power/connectivity |
| BE | Intervention file (dossier d’intervention) | Zone-dependent | Increasingly promoted/integrated | Lack of uniform national access standard |
| HU | Fire protection documentation (OTSZ regime) | Paper preferred for inspections | Mostly voluntary/unclear | Non-recognition during preventive inspections |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).