{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:13:17Z","timestamp":1742944397671,"version":"3.40.3"},"publisher-location":"Cham","reference-count":56,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030112349"},{"type":"electronic","value":"9783030112356"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11235-6_14","type":"book-chapter","created":{"date-parts":[[2019,1,17]],"date-time":"2019-01-17T12:47:25Z","timestamp":1547729245000},"page":"206-222","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Coming to Terms with Telemetry: A Scoping Review"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8084-2739","authenticated-orcid":false,"given":"Martin","family":"Weiss","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1147-1380","authenticated-orcid":false,"given":"Adele","family":"Botha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1089-3925","authenticated-orcid":false,"given":"Marlien","family":"Herselman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,18]]},"reference":[{"key":"14_CR1","unstructured":"AID LEAP. https:\/\/aidleap.org\/2014\/11\/20\/is-there-too-much-innovation-in-development\/"},{"key":"14_CR2","unstructured":"ICTworks. https:\/\/www.ictworks.org\/ugandan-mhealth-moratorium-good-thing\/#.Wr4NpC5uZEY"},{"key":"14_CR3","unstructured":"Otto, K., Shekar, M., Herbst, C.H., Mohammed, R.: Information and communication technologies for health systems strengthening: opportunities, criteria for success, and innovation for Africa and beyond. Discussion Paper. World Bank Group (2015)"},{"key":"14_CR4","volume-title":"The current state of mHealth intervention strategies and implementation in South Africa","author":"A Botha","year":"2016","unstructured":"Botha, A., Booi, T.C.: The current state of mHealth intervention strategies and implementation in South Africa. IST AFrica, Durban, South Africa (2016)"},{"key":"14_CR5","unstructured":"Botha, A., Makitla, I., Fogwill, T., Tolmay, J.: Channel agnostic access for providing services to the masses. In: ZA-WWW, 2011 Conference (2011)"},{"key":"14_CR6","unstructured":"NDoH: eHealth Strategy for South Africa 2012\u20132017. South African National Department of Health, Pretoria (2012)"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1093\/med\/9780199314027.003.0017","volume-title":"Behavioral Health Care and Technology","author":"Garrett Mehl","year":"2014","unstructured":"Mehl, G., et al.: Harnessing mHealth in low-resource settings to overcome health system constraints and achieve universal access to healthcare. In: Behavioral Healthcare and Technology: Using Science-Based Innovations to Transform Practice, p. 239 (2014)"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-1-4614-1740-8","volume-title":"Computer-Supported Collaborative Learning at the Workplace","author":"G Fischer","year":"2013","unstructured":"Fischer, G.: A conceptual framework for computer-supported collaborative learning at work. In: Goggins, S.P., Jahnke, I., Wulf, V. (eds.) Computer-Supported Collaborative Learning at the Workplace, pp. 23\u201342. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4614-1740-8"},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1080\/10810730.2013.864735","volume":"20","author":"A Chib","year":"2015","unstructured":"Chib, A., van Velthoven, M.H., Car, J.: mHealth adoption in low-resource environments: a review of the use of mobile healthcare in developing countries. J. Health Commun. 20, 4\u201334 (2015)","journal-title":"J. Health Commun."},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1177\/2050157912459502","volume":"1","author":"A Chib","year":"2013","unstructured":"Chib, A.: The promise and peril of mHealth in developing countries. Mobile Media Commun. 1, 69\u201375 (2013)","journal-title":"Mobile Media Commun."},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/JSSC.2006.886567","volume":"42","author":"RR Harrison","year":"2007","unstructured":"Harrison, R.R., Watkins, P.T., Kier, R.J., Lovejoy, R.O., Black, D.J., Solzbacher, F.: A low-power integrated circuit for a wireless 100-electrode neural recording system. IEEE J. Solid State Circ. 42, 123\u2013133 (2007)","journal-title":"IEEE J. Solid State Circ."},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/JMEMS.2002.800939","volume":"11","author":"M Fonseca","year":"2002","unstructured":"Fonseca, M., English, J., Arx, M.V., Allen, M.G.: Wireless micromachined ceramic pressure sensor for high-temperature applications. J. Microelectromech. Syst. 11, 337\u2013343 (2002)","journal-title":"J. Microelectromech. Syst."},{"key":"14_CR13","unstructured":"Shi, E., Chan, H., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Annual Network & Distributed System Security Symposium (NDSS). Internet Societ (2011)"},{"key":"14_CR14","unstructured":"Malan, D., Fulford-Jones, T., Welsh, M., Moulton, S.: CodeBlue: an ad hoc sensor network infrastructure for emergency medical care. In: International Workshop on Wearable and Implantable Body Sensor Networks, vol. 5 (2004). icawww.epfl.ch"},{"key":"14_CR15","volume-title":"Telemetry Systems Engineering","author":"B Kopp","year":"2002","unstructured":"Kopp, B.: Industrial telemetry. In: Carden, F., Jedlicka, R.P., Henry, R. (eds.) Telemetry Systems Engineering. Artech House, Norwood (2002)"},{"key":"14_CR16","doi-asserted-by":"crossref","first-page":"32","DOI":"10.24840\/2183-0606_004.004_0004","volume":"4","author":"P Schueffel","year":"2016","unstructured":"Schueffel, P.: Taming the beast: a scientific definition of fintech. J. Innov. Manag. 4, 32 (2016)","journal-title":"J. Innov. Manag."},{"key":"14_CR17","doi-asserted-by":"crossref","DOI":"10.4324\/9781315510897","volume-title":"Introduction to Logic","author":"IM Copi","year":"2016","unstructured":"Copi, I.M., Cohen, C., McMahon, K.: Introduction to Logic. Routledge, New York (2016)"},{"key":"14_CR18","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1057\/ejis.2012.26","volume":"22","author":"RC Nickerson","year":"2013","unstructured":"Nickerson, R.C., Varshney, U., Muntermann, J.: A method for taxonomy development and its application in information systems. Eur. J. Inf. Syst. 22, 336\u2013359 (2013)","journal-title":"Eur. J. Inf. Syst."},{"key":"14_CR19","unstructured":"Nickerson, R., Varshney, U., Muntermann, J., Isaac, H.: Towards a taxonomy of mobile applications. In: AMCIS 2007 Proceedings, p. 338 (2007)"},{"key":"14_CR20","unstructured":"Nickerson, R., Muntermann, J., Varshney, U., Isaac, H.: Taxonomy development in information systems: developing a taxonomy of mobile applications. In: European Conference in Information Systems (2009)"},{"key":"14_CR21","doi-asserted-by":"publisher","DOI":"10.4135\/9781412986397","volume-title":"Typologies and Taxonomies: An Introduction to Classification Techniques","author":"KD Bailey","year":"1994","unstructured":"Bailey, K.D.: Typologies and Taxonomies: An Introduction to Classification Techniques. Sage, Thousand Oaks (1994)"},{"key":"14_CR22","volume-title":"Constructive Typology and Social Theory","author":"JC McKinney","year":"1966","unstructured":"McKinney, J.C.: Constructive Typology and Social Theory. Ardent Media, New York (1966)"},{"key":"14_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-3907-7","volume-title":"Abductive Reasoning","author":"A Aliseda","year":"2006","unstructured":"Aliseda, A.: Abductive Reasoning. Springer, Dordrecht (2006). https:\/\/doi.org\/10.1007\/1-4020-3907-7"},{"key":"14_CR24","volume-title":"Core Questions in Philosophy: A Text with Readings","author":"E Sober","year":"2001","unstructured":"Sober, E.: Core Questions in Philosophy: A Text with Readings. Prentice Hall, Upper Saddle River (2001)"},{"key":"14_CR25","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1186\/1748-5908-5-2","volume":"5","author":"SE Brien","year":"2010","unstructured":"Brien, S.E., Lorenzetti, D.L., Lewis, S., Kennedy, J., Ghali, W.A.: Overview of a formal scoping review on health system report cards. Implement. Sci. 5, 2 (2010)","journal-title":"Implement. Sci."},{"key":"14_CR26","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1080\/1364557032000119616","volume":"8","author":"H Arksey","year":"2005","unstructured":"Arksey, H., O\u2019Malley, L.: Scoping studies: towards a methodological framework. Int. J. Soc. Res. Methodol. 8, 19\u201332 (2005)","journal-title":"Int. J. Soc. Res. Methodol."},{"key":"14_CR27","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1002\/(SICI)1098-240X(199708)20:4<365::AID-NUR9>3.0.CO;2-E","volume":"20","author":"M Sandelowski","year":"1997","unstructured":"Sandelowski, M., Docherty, S., Emden, C.: Qualitative metasynthesis: issues and techniques. Res. Nurs. Health 20, 365\u2013371 (1997)","journal-title":"Res. Nurs. Health"},{"key":"14_CR28","unstructured":"Ellis, T.J., Levy, Y.: A guide for novice researchers: design and development research methods. In: Proceedings of Informing Science & IT Education Conference, InSITE. Citeseer (2010)"},{"key":"14_CR29","doi-asserted-by":"crossref","unstructured":"Okoli, C., Schabram, K.: A guide to conducting a systematic literature review of information systems research. Sprouts: Working Papers on Information Systems, vol. 10 (2010)","DOI":"10.2139\/ssrn.1954824"},{"key":"14_CR30","doi-asserted-by":"publisher","first-page":"e1000100","DOI":"10.1371\/journal.pmed.1000100","volume":"6","author":"A Liberati","year":"2009","unstructured":"Liberati, A., et al.: The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration. PLoS Med. 6, e1000100 (2009)","journal-title":"PLoS Med."},{"key":"14_CR31","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1016\/j.procs.2014.05.536","volume":"32","author":"MB Alaya","year":"2014","unstructured":"Alaya, M.B., Banouar, Y., Monteil, T., Chassot, C., Drira, K.: OM2M: extensible ETSI-compliant M2M service platform with self-configuration capability. Procedia Comput. Sci. 32, 1079\u20131086 (2014)","journal-title":"Procedia Comput. Sci."},{"key":"14_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.09.008","volume":"54","author":"E Borgia","year":"2014","unstructured":"Borgia, E.: The Internet of Things vision: key features, applications and open issues. Comput. Commun. 54, 1\u201331 (2014)","journal-title":"Comput. Commun."},{"key":"14_CR33","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., de Donato, W., Persico, V., Pescap\u00e9, A.: Integration of Cloud computing and Internet of Things: a survey. Futur. Gener. Comput. Syst. 56, 684\u2013700 (2016)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Castro, M., Jara, A.J., Skarmeta, A.F.: An analysis of M2M platforms: challenges and opportunities for the Internet of Things. In: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 757\u2013762. IEEE (2012)","DOI":"10.1109\/IMIS.2012.184"},{"key":"14_CR35","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/SURV.2013.110113.00249","volume":"16","author":"M Chen","year":"2014","unstructured":"Chen, M., Wan, J., Gonz\u00e1lez-Valenzuela, S., Liao, X., Leung, V.C.: A survey of recent developments in home M2M networks. IEEE Commun. Surv. Tutor. 16, 98\u2013114 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"14_CR36","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1109\/TPWRS.2006.873109","volume":"21","author":"EM Davidson","year":"2006","unstructured":"Davidson, E.M., McArthur, S.D., McDonald, J.R., Cumming, T., Watt, I.: Applying multi-agent system technology in practice: automated management and analysis of SCADA and digital fault recorder data. IEEE Trans. Power Syst. 21, 559\u2013567 (2006)","journal-title":"IEEE Trans. Power Syst."},{"key":"14_CR37","unstructured":"DZone.com. https:\/\/dzone.com\/articles\/iot-software-platform-comparison"},{"key":"14_CR38","unstructured":"Dhande, N.S.: Review On SCADA: Virtual Instrument Management"},{"key":"14_CR39","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MWC.2014.6757898","volume":"21","author":"Z Fan","year":"2014","unstructured":"Fan, Z., Haines, R., Kulkarni, P.: M2M communications for E-health and smart grid: an industry and standard perspective. IEEE Wirel. Commun. 21, 62\u201369 (2014)","journal-title":"IEEE Wirel. Commun."},{"key":"14_CR40","unstructured":"Gabbai, A.: Kevin Ashton Describes \u201cthe Internet of Things\u201d. Smithsonian Magazine (2015)"},{"key":"14_CR41","unstructured":"King, P.: SCADA systems\u2013looking ahead. Control Microsystems Whitepaper, p. 83 (2005)"},{"key":"14_CR42","doi-asserted-by":"crossref","unstructured":"Kwasnick, R., et al.: Telemetry for reliability. In: 2017 IEEE International Reliability Physics Symposium (IRPS), pp. 6C-2.1\u20136C-2.6. IEEE (2017)","DOI":"10.1109\/IRPS.2017.7936346"},{"key":"14_CR43","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.comcom.2016.03.015","volume":"89","author":"J Mineraud","year":"2016","unstructured":"Mineraud, J., Mazhelis, O., Su, X., Tarkoma, S.: A gap analysis of Internet-of-Things platforms. Comput. Commun. 89, 5\u201316 (2016)","journal-title":"Comput. Commun."},{"key":"14_CR44","doi-asserted-by":"publisher","first-page":"19582","DOI":"10.3390\/s141019582","volume":"14","author":"C Pereira","year":"2014","unstructured":"Pereira, C., Aguiar, A.: Towards efficient mobile M2M communications: survey and open challenges. Sensors 14, 19582 (2014)","journal-title":"Sensors"},{"key":"14_CR45","unstructured":"https:\/\/www.ptc.com\/en\/products\/iot"},{"key":"14_CR46","doi-asserted-by":"crossref","unstructured":"Queiroz, C., Mahmood, A., Tari, Z.: An analytical framework for evaluating survivability of SCADA systems. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 877\u2013881. IEEE (2010)","DOI":"10.1109\/CIT.2010.164"},{"key":"14_CR47","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.jestch.2016.08.011","volume":"20","author":"A Rezai","year":"2017","unstructured":"Rezai, A., Keshavarzi, P., Moravej, Z.: Key management issue in SCADA networks: a review. Eng. Sci. Technol. Int. J. 20, 354\u2013363 (2017)","journal-title":"Eng. Sci. Technol. Int. J."},{"key":"14_CR48","doi-asserted-by":"publisher","first-page":"1375","DOI":"10.1109\/ACCESS.2016.2549047","volume":"4","author":"A Sajid","year":"2016","unstructured":"Sajid, A., Abbas, H., Saleem, K.: Cloud-Assisted IoT-Based SCADA systems security: a review of the state of the art and future challenges. IEEE Access 4, 1375\u20131384 (2016)","journal-title":"IEEE Access"},{"key":"14_CR49","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.3844\/ajassp.2014.1418.1425","volume":"11","author":"A Shahzad","year":"2014","unstructured":"Shahzad, A., Musa, S., Aborujilah, A., Irfan, M.: The SCADA review: system components, architecture, protocols and future security trends. Am. J. Appl. Sci. 11, 1418 (2014)","journal-title":"Am. J. Appl. Sci."},{"key":"14_CR50","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.3844\/ajassp.2014.1398.1404","volume":"11","author":"A Shahzad","year":"2014","unstructured":"Shahzad, A., Musa, S., Aborujilah, A., Irfan, M.: A review: industrial control system (ICS) and their secuity issues. Am. J. Appl. Sci. 11, 1398\u20131404 (2014)","journal-title":"Am. J. Appl. Sci."},{"key":"14_CR51","unstructured":"dzone.com. http:\/\/thinkpalm.com\/blogs\/lets-get-mqtt-rolling\/"},{"key":"14_CR52","doi-asserted-by":"crossref","unstructured":"Wan, J., Li, D., Zou, C., Zhou, K.: M2M communications for smart city: an event-based architecture. In: 2012 IEEE 12th International Conference on Computer and Information Technology, pp. 895\u2013900 (2012)","DOI":"10.1109\/CIT.2012.188"},{"key":"14_CR53","unstructured":"https:\/\/www.sierrawireless.com\/resources\/#\/q=Case%2520Study%7CAirVantage%2520IoT%2520Platform&p=0"},{"key":"14_CR54","unstructured":"Wireless, S.: Planning a longterm wireless strategy. Sireea Wireless (2018)"},{"key":"14_CR55","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOM.2011.5741144","volume":"49","author":"G Wu","year":"2011","unstructured":"Wu, G., Talwar, S., Johnsson, K., Himayat, N., Johnson, K.D.: M2M: from mobile to embedded internet. IEEE Commun. Mag. 49, 36\u201343 (2011)","journal-title":"IEEE Commun. Mag."},{"key":"14_CR56","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MC.2012.325","volume":"45","author":"I Ahmed","year":"2012","unstructured":"Ahmed, I., Obermeier, S., Naedele, M., Richard III, G.G.: SCADA systems: challenges for forensic investigators. Computer 45, 44\u201351 (2012)","journal-title":"Computer"}],"container-title":["Communications in Computer and Information Science","Locally Relevant ICT Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11235-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T14:24:39Z","timestamp":1662819879000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-11235-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030112349","9783030112356"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11235-6_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"18 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Development Informatics Association Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tshwane","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"South Africa","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idia2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/idia2018.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}