{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:25:01Z","timestamp":1743121501981,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031194283"},{"type":"electronic","value":"9783031194290"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19429-0_12","type":"book-chapter","created":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T12:03:07Z","timestamp":1668859387000},"page":"187-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Where There is No CISO"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9873-4544","authenticated-orcid":false,"given":"Johan Ivar","family":"S\u00e6b\u00f8","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0138-366X","authenticated-orcid":false,"given":"Andre","family":"B\u00fcttner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7360-8314","authenticated-orcid":false,"given":"Nils","family":"Gruschka","sequence":"additional","affiliation":[]},{"given":"Bob","family":"Jolliffe","sequence":"additional","affiliation":[]},{"given":"Austin","family":"McGee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,20]]},"reference":[{"key":"12_CR1","unstructured":"Adu-Gyamfi, E., Nielsen, P., S\u00e6b\u00f8, J.: The dynamics of a global health information systems research and implementation project. In: Proceedings of the 17th Scandinavian Conference on Health Informatics, Oslo, Norway, 12\u201313 November (2019)"},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1080\/02681102.2014.902354","volume":"21","author":"B Jolliffe","year":"2015","unstructured":"Jolliffe, B., Poppe, O., Adaletey, D., Braa, J.: Models for online computing in developing countries: issues and deliberations. Inf. Technol. Dev. 21(1), 151\u2013161 (2015). https:\/\/doi.org\/10.1080\/02681102.2014.902354","journal-title":"Inf. Technol. Dev."},{"issue":"6","key":"12_CR3","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1111\/isj.12364","volume":"31","author":"B Nicholson","year":"2021","unstructured":"Nicholson, B., Nielsen, P., Saebo, J.: Special issue: digital platforms for development. Inf. Syst. J. 31(6), 863\u2013868 (2021). https:\/\/doi.org\/10.1111\/isj.12364","journal-title":"Inf. Syst. J."},{"key":"12_CR4","volume-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power","author":"S Zuboff","year":"2019","unstructured":"Zuboff, S.: The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs, New York (2019)"},{"key":"12_CR5","unstructured":"Werner, D., Thuman, C., Maxwell, J.: Where there is no doctor: a village health care handbook. Hesperian Health Guides (2020)"},{"issue":"1","key":"12_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1080\/1364557032000119616","volume":"8","author":"H Arksey","year":"2005","unstructured":"Arksey, H., O\u2019Malley, L.: Scoping studies: towards a methodological framework. Int. J. Soc. Res. Methodol. 8(1), 19\u201332 (2005). https:\/\/doi.org\/10.1080\/1364557032000119616","journal-title":"Int. J. Soc. Res. Methodol."},{"issue":"1","key":"12_CR7","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1108\/13287269780000733","volume":"1","author":"RL Baskerville","year":"1997","unstructured":"Baskerville, R.L.: Distinguishing action research from participative case studies. J. Syst. Info. Tech. 1(1), 24\u201343 (1997). https:\/\/doi.org\/10.1108\/13287269780000733","journal-title":"J. Syst. Info. Tech."},{"issue":"3","key":"12_CR8","doi-asserted-by":"publisher","first-page":"337","DOI":"10.2307\/25148643","volume":"28","author":"J Braa","year":"2004","unstructured":"Braa, J., Monteiro, E., Sahay, S.: Networks of action: sustainable health information systems across developing countries. MIS Quarterly 28(3), 337 (2004). https:\/\/doi.org\/10.2307\/25148643","journal-title":"MIS Quarterly"},{"key":"12_CR9","unstructured":"Solomon, M.G., Chapple, M.: Information security illuminated. Jones and Bartlett Publishers (2004)"},{"issue":"1","key":"12_CR10","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"MT Siponen","year":"2000","unstructured":"Siponen, M.T.: A conceptual foundation for organizational information security awareness. Inf. Manag. Comput. Secur. 8(1), 31\u201341 (2000). https:\/\/doi.org\/10.1108\/09685220010371394","journal-title":"Inf. Manag. Comput. Secur."},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-030-41215-9_9","volume-title":"Public Health Informatics and Information Systems Health Informatics HI","author":"R Hulkower","year":"2020","unstructured":"Hulkower, R., Penn, M., Schmit, C.: Privacy and confidentiality of public health information. In: Magnuson, J.A., Dixon, B.E. (eds.) Public Health Informatics and Information Systems Health Informatics HI, pp. 147\u2013166. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-41215-9_9"},{"issue":"8","key":"12_CR12","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1080\/09720529.2019.1692450","volume":"22","author":"MK Misra","year":"2019","unstructured":"Misra, M.K., Chaturvedi, A., Tripathi, S.P., Shukla, V.: A unique key sharing protocol among three users using non-commutative group for electronic health record system. J. Discret. Math. Sci. Cryptogr. 22(8), 1435\u20131451 (2019). https:\/\/doi.org\/10.1080\/09720529.2019.1692450","journal-title":"J. Discret. Math. Sci. Cryptogr."},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Kamble, P., Gawade, A.: Digitalization of healthcare with IoT and cryptographic encryption against DOS attacks. In: 2019 International Conference on contemporary Computing and Informatics (IC3I), pp. 69\u201373 (2019 Dec). https:\/\/doi.org\/10.1109\/IC3I46837.2019.9055531","DOI":"10.1109\/IC3I46837.2019.9055531"},{"key":"12_CR14","unstructured":"Sari, P.K., Yazid, S.: Design of blockchain-based electronic health records for indonesian context: narrative Review. https:\/\/ieeexplore.ieee.org\/abstract\/document\/9255571?casa_token=aPIf9bowQucAAAAA:JOJd5MYSIOa6l2Hn3ic_i0HgOevIFgCyvVYyzY6I9G8k1eKXijDkYBWkCHvoUEgz_qb7WuZ33A. Accessed 17 Jan 2022"},{"key":"12_CR15","doi-asserted-by":"publisher","unstructured":"Osebe, S., et al.: Enabling care continuity using a digital health wallet. In: 2019 IEEE International Conference on Healthcare Informatics (ICHI), pp. 1\u20137 (Jun 2019). https:\/\/doi.org\/10.1109\/ICHI.2019.8904625","DOI":"10.1109\/ICHI.2019.8904625"},{"issue":"Suppl 1","key":"12_CR16","doi-asserted-by":"publisher","first-page":"S8","DOI":"10.1186\/1472-6939-14-S1-S8","volume":"14","author":"C Jack","year":"2013","unstructured":"Jack, C., Singh, Y., Mars, M.: Pitfalls in computer housekeeping by doctors and nurses in KwaZulu-Natal: no malicious intent. BMC Med. Ethics 14(Suppl 1), S8 (2013). https:\/\/doi.org\/10.1186\/1472-6939-14-S1-S8","journal-title":"BMC Med. Ethics"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.3233\/978-1-61499-658-3-1003","volume":"2016","author":"SR Tissera","year":"2016","unstructured":"Tissera, S.R., Silva, S.N.: Attitude towards health information privacy and electronic health records among urban sri lankan adults. Nursing Informatics 2016, 1003\u20131004 (2016). https:\/\/doi.org\/10.3233\/978-1-61499-658-3-1003","journal-title":"Nursing Informatics"},{"issue":"12","key":"12_CR18","doi-asserted-by":"publisher","first-page":"939","DOI":"10.2471\/BLT.07.049908","volume":"86","author":"M Forster","year":"2008","unstructured":"Forster, M., et al.: Electronic medical record systems, data quality and loss to follow-up: survey of antiretroviral therapy programmes in resource-limited settings. Bull World Health Organ 86(12), 939\u2013947 (2008). https:\/\/doi.org\/10.2471\/BLT.07.049908","journal-title":"Bull World Health Organ"},{"key":"12_CR19","doi-asserted-by":"publisher","unstructured":"Gesicho, M.B., Moon, T.D., Heitman, E., Were, M.C.: Ethical issues in implementing national-level health data warehouses in developing countries. MEDINFO 2017: Precision Healthcare Through Informatics, pp. 718\u2013722 (2017). https:\/\/doi.org\/10.3233\/978-1-61499-830-3-718","DOI":"10.3233\/978-1-61499-830-3-718"},{"key":"12_CR20","doi-asserted-by":"publisher","unstructured":"Namara, M., Wilkinson, D., Lowens, B.M., Knijnenburg, B.P., Orji, R., Sekou, R.L.: Cross-cultural perspectives on eHealth privacy in Africa. In: Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities, New York, NY, USA, pp. 1\u201311 (Dec 2018). https:\/\/doi.org\/10.1145\/3283458.3283472","DOI":"10.1145\/3283458.3283472"},{"key":"12_CR21","doi-asserted-by":"publisher","unstructured":"Antonio, C.A.T., Patdu, I.D., Marcelo, A.B.: Health information privacy in the philippines: trends and challenges in policy and practice. Acta Med. Philipp. 50(4) (Dec 2016). https:\/\/doi.org\/10.47895\/amp.v50i4.760","DOI":"10.47895\/amp.v50i4.760"},{"key":"12_CR22","unstructured":"Gerson, N., Shava, F.B.: A review of security system assessment tools - ProQuest. https:\/\/www.proquest.com\/docview\/2455896172\/fulltextPDF\/237C474A4684F42PQ\/1. Accessed 17 Jan 2022"},{"key":"12_CR23","doi-asserted-by":"publisher","unstructured":"Zainudin, A., Sudarsono, A., Prakoso, B.M.: An implementation of secure medical data delivery for rural areas through delay tolerant network. In: 2016 International Electronics Symposium (IES), pp. 414\u2013419 (Sep 2016). https:\/\/doi.org\/10.1109\/ELECSYM.2016.7861042","DOI":"10.1109\/ELECSYM.2016.7861042"},{"key":"12_CR24","doi-asserted-by":"publisher","unstructured":"Pankomera, R., van Greunen, D.: Mitigating vulnerabilities and threats for patient-centric healthcare systems in low income developing countries. In: 2017 IST-Africa Week Conference (IST-Africa), pp. 1\u201311 (May 2017). https:\/\/doi.org\/10.23919\/ISTAFRICA.2017.8102384","DOI":"10.23919\/ISTAFRICA.2017.8102384"},{"key":"12_CR25","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-319-54687-2_15","volume-title":"Stakeholders and Information Technology in Education","author":"A Koivu","year":"2016","unstructured":"Koivu, A., Mavengere, N., Ruohonen, M.J., Hederman, L., Grimson, J.: Exploring the information and ICT skills of health professionals in low- and middle-income countries. In: Brinda, T., Mavengere, N., Haukij\u00e4rvi, I., Lewin, C., Passey, D. (eds.) SaITE 2016. IAICT, vol. 493, pp. 152\u2013162. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-54687-2_15"},{"issue":"11","key":"12_CR26","doi-asserted-by":"publisher","first-page":"e0188160","DOI":"10.1371\/journal.pone.0188160","volume":"12","author":"NK Hai","year":"2017","unstructured":"Hai, N.K., Lawpoolsri, S., Jittamala, P., Huong, P.T.T., Kaewkungwal, J.: Practices in security and confidentiality of HIV\/AIDS patients\u2019 information: a national survey among staff at HIV outpatient clinics in Vietnam. PLoS One 12(11), e0188160 (2017). https:\/\/doi.org\/10.1371\/journal.pone.0188160","journal-title":"PLoS One"},{"key":"12_CR27","doi-asserted-by":"publisher","unstructured":"Khan, S.I., Hoque, A.S.Md.L.: Health data integration with secured record linkage: a practical solution for bangladesh and other developing countries. In: 2017 International Conference on Networking, Systems and Security (NSysS), pp. 156\u2013161 (Jan 2017). https:\/\/doi.org\/10.1109\/NSysS.2017.7885818","DOI":"10.1109\/NSysS.2017.7885818"},{"key":"12_CR28","unstructured":"Roland, L.K., Sanner, T., S\u00e6b\u00f8, J.I., Monteiro, E.: P for Platform. Architectures of large-scale participatory design. Scand. J. Inf. Syst. 29(2), (Dec 2017). [Online]. Available: http:\/\/aisel.aisnet.org\/sjis\/vol29\/iss2\/1"}],"container-title":["IFIP Advances in Information and Communication Technology","Freedom and Social Inclusion in a Connected World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19429-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T12:08:53Z","timestamp":1668859733000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19429-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031194283","9783031194290"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19429-0_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"20 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICT4D","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Social Implications of Computers in Developing Countries","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lima","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Peru","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsicdc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/qasifip.ue.edu.pe\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}