{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T11:04:54Z","timestamp":1770894294487,"version":"3.50.1"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032164537","type":"print"},{"value":"9783032164544","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16454-4_9","type":"book-chapter","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T10:06:58Z","timestamp":1770890818000},"page":"149-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Human-Centered Design for\u00a0a\u00a0Usable Privacy SCALE in\u00a0Healthcare"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7969-8813","authenticated-orcid":false,"given":"Catarina","family":"Silva","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9145-4109","authenticated-orcid":false,"given":"Rita","family":"Alves","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8645-0189","authenticated-orcid":false,"given":"Isaac","family":"Nunes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7173-459X","authenticated-orcid":false,"given":"Joana","family":"Pinto","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0953-9411","authenticated-orcid":false,"given":"Ana","family":"Ferreira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,13]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","unstructured":"Almasi, S., Bahaadinbeigy, K., Ahmadi, H., Sohrabei, S., Rabiei, R.: Usability evaluation of dashboards: a systematic literature review of tools, January 2023. https:\/\/doi.org\/10.1155\/2023\/9990933","DOI":"10.1155\/2023\/9990933"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Alohaly, M., Takabi, H.: If you can\u2019t measure it, you can\u2019t manage it: towards quantification of privacy policies. In: 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), pp. 539\u2013545 (2016). https:\/\/doi.org\/10.1109\/CIC.2016.082","DOI":"10.1109\/CIC.2016.082"},{"key":"9_CR3","doi-asserted-by":"publisher","unstructured":"Alturki, R., Gay, V., Awan, N., Alshehri, M.D., Mohammed, J., Kundi, M.: Analysis of an ehealth app: privacy, security and usability. Int. J. Adv. Comput. Sci. Appl. 11 (2020). https:\/\/doi.org\/10.14569\/ijacsa.2020.0110428","DOI":"10.14569\/ijacsa.2020.0110428"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Askin, \u00d6., Kutta, T., Dette, H.: Statistical quantification of differential privacy: a local approach. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 402\u2013421. IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833689"},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Barth, S., Ionita, D., de\u00a0Jong, M.D., Hartel, P., Junger, M.: Privacy rating: a user-centered approach for visualizing data handling practices of online services. IEEE Trans. Prof. Commun. 64, 354\u2013373 (2021). https:\/\/doi.org\/10.1109\/tpc.2021.3110617","DOI":"10.1109\/tpc.2021.3110617"},{"key":"9_CR6","doi-asserted-by":"publisher","unstructured":"Demiris, G., et al.: Patient-centered applications: use of information technology to promote disease management and wellness. A white paper by the AMIA knowledge in motion working group (2007). https:\/\/doi.org\/10.1197\/jamia.m2492","DOI":"10.1197\/jamia.m2492"},{"key":"9_CR7","unstructured":"Emami-Naeini, P., et al.: Privacy expectations and preferences in an IoT world. In: Symposium on Usable Privacy and Security, July 2017, pp. 399\u2013412 (2017)"},{"key":"9_CR8","doi-asserted-by":"publisher","unstructured":"Ermakova, T., Fabian, B., Kornacka, M., Thiebes, S., Sunyaev, A.: Security and privacy requirements for cloud computing in healthcare. ACM Trans. Manag. Inf. Syst. 11, 1\u201329 (2020). https:\/\/doi.org\/10.1145\/3386160","DOI":"10.1145\/3386160"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Felisberto, J., Silva, C., Barraca, J.P., Salvador, P., Tom\u00e1s, P.: PrivGuide: a planning tool for proactive privacy integration in the DevPrivOps lifecycle (2025)","DOI":"10.1109\/ISCC65549.2025.11326355"},{"key":"9_CR10","doi-asserted-by":"publisher","unstructured":"Fox, G.: \u201cto protect my health or to protect my health privacy?\u201d a mixed-methods investigation of the privacy paradox. J. Assoc. Inf. Sci. Technol. 71, 1015\u20131029 (2020). https:\/\/doi.org\/10.1002\/asi.24369","DOI":"10.1002\/asi.24369"},{"key":"9_CR11","doi-asserted-by":"publisher","unstructured":"Frener, R., Dombrowski, J., Trepte, S.: Development and validation of the need for privacy scale (NFP-S). Commun. Meth. Meas. 18, 48\u201371 (2023). https:\/\/doi.org\/10.1080\/19312458.2023.2246014","DOI":"10.1080\/19312458.2023.2246014"},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"Gerber, N., Gerber, P., Volkamer, M.: Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior (2018). https:\/\/doi.org\/10.1016\/j.cose.2018.04.002","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Halimi, A., Ayday, E.: Real-time privacy risk quantification in online social networks. In: Proceedings of the 2021 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 74\u201381 (2021)","DOI":"10.1145\/3487351.3488272"},{"key":"9_CR14","doi-asserted-by":"publisher","unstructured":"Ioannou, A., Tussyadiah, I., Miller, G., Li, S., Weick, M.: Privacy nudges for disclosure of personal information: a systematic literature review and meta-analysis (2021). https:\/\/doi.org\/10.1371\/journal.pone.0256822","DOI":"10.1371\/journal.pone.0256822"},{"key":"9_CR15","doi-asserted-by":"publisher","unstructured":"Kroes, S.K.S., Janssen, M.P., Groenwold, R.H.H., van Leeuwen, M.: Evaluating privacy of individuals in medical data. Health Inform. J. 27 (2021). https:\/\/doi.org\/10.1177\/1460458220983398","DOI":"10.1177\/1460458220983398"},{"key":"9_CR16","doi-asserted-by":"publisher","unstructured":"Mehta, V., Gooch, D., Bandara, A.K., Price, B., Nuseibeh, B.: Privacy care 21, 1\u201332 (2021). https:\/\/doi.org\/10.1145\/3430506","DOI":"10.1145\/3430506"},{"issue":"7","key":"9_CR17","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1177\/0969733013515489","volume":"21","author":"H \u00d6zturk","year":"2014","unstructured":"\u00d6zturk, H., Bah\u00e7ecik, N., \u00d6z\u00e7elik, K.S.: The development of the patient privacy scale in nursing. Nurs. Ethics 21(7), 812\u2013828 (2014)","journal-title":"Nurs. Ethics"},{"key":"9_CR18","doi-asserted-by":"publisher","unstructured":"Price, W.N., Cohen, I.G.: Privacy in the age of medical big data (2018). https:\/\/doi.org\/10.1038\/s41591-018-0272-7","DOI":"10.1038\/s41591-018-0272-7"},{"key":"9_CR19","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-03315-5_17","volume-title":"The Future of Identity in the Information Society","author":"S P\u00f6tzsch","year":"2009","unstructured":"P\u00f6tzsch, S.: Privacy awareness: a means to solve the privacy paradox? In: Maty\u00e1\u0161, V., Fischer-H\u00fcbner, S., Cvr\u010dek, D., \u0160venda, P. (eds.) Privacy and Identity 2008. IAICT, vol. 298, pp. 226\u2013236. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03315-5_17"},{"key":"9_CR20","doi-asserted-by":"publisher","unstructured":"Reddy, S., Allan, S., Coghlan, S., Cooper, P.: A governance model for the application of AI in health care. J. Am. Med. Inform. Assoc. 27, 491\u2013497 (2019). https:\/\/doi.org\/10.1093\/jamia\/ocz192","DOI":"10.1093\/jamia\/ocz192"},{"key":"9_CR21","doi-asserted-by":"publisher","unstructured":"Rossi, A., Lenzini, G.: Transparency by design in data-informed research: a collection of information design patterns. Comput. Law Secur. Rev. 37, 105402\u2013105402 (2020). https:\/\/doi.org\/10.1016\/j.clsr.2020.105402","DOI":"10.1016\/j.clsr.2020.105402"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Silva, C., Barraca, J., Salvador, P.: Evaluating the effectiveness of differential privacy against profiling. In: Proceedings of the 2025 The International Conference on Consumer Technology, ICCT-Europe 2025, Algarve, Portugal, pp. 28\u201330 (2025)","DOI":"10.1109\/ICCT-Europe63283.2025.11157698"},{"issue":"3","key":"9_CR23","doi-asserted-by":"publisher","first-page":"185","DOI":"10.3390\/info16030185","volume":"16","author":"C Silva","year":"2025","unstructured":"Silva, C., Barraca, J.P., Salvador, P.: Proactive data categorization for privacy in DevPrivOps. Information 16(3), 185 (2025)","journal-title":"Information"},{"issue":"6","key":"9_CR24","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MCOM.004.2300405","volume":"62","author":"C Silva","year":"2024","unstructured":"Silva, C., Cunha, V.A., Barraca, J.P., Salvador, P.: Privacy-based deployments: the role of DevPrivOps in 6G mobile networks. IEEE Commun. Mag. 62(6), 66\u201372 (2024)","journal-title":"IEEE Commun. Mag."},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Silva, C., Felisberto, J., Barraca, J.P., Salvador, P.: ASAP 2.0: autonomous & proactive detection of malicious applications for privacy quantification in 6G network services. Comput. Commun. 237, 108145 (2025)","DOI":"10.1016\/j.comcom.2025.108145"},{"key":"9_CR26","unstructured":"Solove, D.J.: Privacy self-management and the consent dilemma. SSRN Electron. J. (2013)"},{"key":"9_CR27","doi-asserted-by":"publisher","unstructured":"Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Trans. Softw. Eng. 35, 67\u201382 (2008). https:\/\/doi.org\/10.1109\/tse.2008.88","DOI":"10.1109\/tse.2008.88"},{"key":"9_CR28","doi-asserted-by":"publisher","unstructured":"Thapa, C., Camtepe, S.: Precision health data: requirements, challenges and existing techniques for data security and privacy (2020). https:\/\/doi.org\/10.1016\/j.compbiomed.2020.104130","DOI":"10.1016\/j.compbiomed.2020.104130"},{"key":"9_CR29","doi-asserted-by":"publisher","unstructured":"Torkzadehmahani, R., et al.: Privacy-preserving artificial intelligence techniques in biomedicine. Meth. Inf. Med. 61 (2022). https:\/\/doi.org\/10.1055\/s-0041-1740630","DOI":"10.1055\/s-0041-1740630"},{"issue":"4","key":"9_CR30","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1111\/bjet.13223","volume":"53","author":"D Vatsalan","year":"2022","unstructured":"Vatsalan, D., Rakotoarivelo, T., Bhaskar, R., Tyler, P., Ladjal, D.: Privacy risk quantification in education data using Markov model. Br. J. Edu. Technol. 53(4), 804\u2013821 (2022)","journal-title":"Br. J. Edu. Technol."},{"key":"9_CR31","doi-asserted-by":"publisher","unstructured":"Zakkar, M.A., Sedig, K.: Interactive visualization of public health indicators to support policymaking: an exploratory study. Online J. Public Health Inform. 9 (2017). https:\/\/doi.org\/10.5210\/ojphi.v9i2.8000","DOI":"10.5210\/ojphi.v9i2.8000"},{"key":"9_CR32","doi-asserted-by":"publisher","unstructured":"Zandesh, Z.: Privacy, security, and legal issues in the health cloud: structured review for taxonomy development. JMIR Formative Res. 8 (2024). https:\/\/doi.org\/10.2196\/38372","DOI":"10.2196\/38372"},{"key":"9_CR33","doi-asserted-by":"publisher","unstructured":"Zhang, S., Song, J.: An empirical investigation into the preferences of the elderly for user interface design in personal electronic health record systems. Front. Digit. Health 5 (2024). https:\/\/doi.org\/10.3389\/fdgth.2023.1289904","DOI":"10.3389\/fdgth.2023.1289904"},{"key":"9_CR34","doi-asserted-by":"publisher","unstructured":"\u00d6zt\u00fcrk, H., Bah\u00e7ecik, N., \u00d6z\u00e7elik, K.S.: Nursing Ethics 21, 812\u2013828 (2014). https:\/\/doi.org\/10.1177\/0969733013515489","DOI":"10.1177\/0969733013515489"}],"container-title":["Communications in Computer and Information Science","Computer-Human Interaction Research and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16454-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T10:07:07Z","timestamp":1770890827000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16454-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032164537","9783032164544"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16454-4_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"13 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CHIRA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer-Human Interaction Research and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marbella","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"chira2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/chira.scitevents.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}