{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:17:56Z","timestamp":1743092276567,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319072265"},{"type":"electronic","value":"9783319072272"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07227-2_17","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T16:44:08Z","timestamp":1402418648000},"page":"166-177","source":"Crossref","is-referenced-by-count":1,"title":["Mobile Users Are More Vigilant Than Situated Users"],"prefix":"10.1007","author":[{"given":"M.","family":"Giles Phillips","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","first-page":"119","volume-title":"MacArthur Foundation Series on Digital Learning - Youth, Identity, and Digital Media Volume","author":"D. Boyd","year":"2007","unstructured":"Boyd, D.: Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life. In: Buckingham, D. (ed.) MacArthur Foundation Series on Digital Learning - Youth, Identity, and Digital Media Volume, pp. 119\u2013142. MIT Press, Cambridge (2007)"},{"key":"17_CR2","unstructured":"Boyd, D.: Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications. In: Papacharissi, Z. (ed.) Networked Self: Identity, Community, and Culture on Social Network Sites, pp. 39\u201358 (2010)"},{"key":"17_CR3","volume-title":"Defense In Animals: a Survey of Anti-predator Defenses","author":"M. Edmunds","year":"1974","unstructured":"Edmunds, M.: Defense In Animals: a Survey of Anti-predator Defenses. Longman, New York (1974)"},{"issue":"3","key":"17_CR4","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1006\/anbe.1999.1182","volume":"58","author":"S.L. Lima","year":"1999","unstructured":"Lima, S.L., Bednekoff, P.A.: Back to the basics of antipredatory vigilance: can nonvigilant animals detect attack? Animal Behaviour\u00a058(3), 537\u2013543 (1999)","journal-title":"Animal Behaviour"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1080\/17470214808416738","volume":"1","author":"N.H. Mackworth","year":"1948","unstructured":"Mackworth, N.H.: The breakdown of vigilance during prolonged visual search. Quarterly Journal of Experimental Psychology\u00a01, 6\u201321 (1948)","journal-title":"Quarterly Journal of Experimental Psychology"},{"key":"17_CR6","unstructured":"Youth Are Moving to Mobile Devices for Their Communication Needs: R You Here? American Press Institute,, http:\/\/www.americanpressinstitute.org\/wp-content\/uploads\/2013\/09\/NIE_youth-moving-to-mobile.pdf"},{"key":"17_CR7","first-page":"493","volume-title":"Attention and Performance XI","author":"R. Parasuraman","year":"1985","unstructured":"Parasuraman, R.: Sustained attention: a multifactorial approach. In: Posner, M., Marin, O. (eds.) Attention and Performance XI, pp. 493\u2013511. Lawrence Erlbaum, Hillsdale (1985)"},{"volume-title":"The Attentive Brain","year":"1998","key":"17_CR8","unstructured":"Parasuraman, R. (ed.): The Attentive Brain. The MIT Press, Cambridge (1998)"},{"key":"17_CR9","first-page":"123","volume-title":"Quantifying Human Information Processing","author":"R. Parasuraman","year":"2005","unstructured":"Parasuraman, R., Caggiano, G.: Neural and genetic assays of mental workload. In: McBride, D., Schmorrow, D. (eds.) Quantifying Human Information Processing, pp. 123\u2013155. Rowman and Littlefield, Lanham (2005)"},{"key":"17_CR10","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1145\/2380718.2380749","volume-title":"3rd Annual ACM Web Science Conference","author":"M.G. Phillips","year":"2012","unstructured":"Phillips, M.G.: Designing for Vigilance during Intermittent Use. In: 3rd Annual ACM Web Science Conference, pp. 243\u2013246. ACM, New York (2012)"},{"key":"17_CR11","unstructured":"Mobile Factbook, Portio Research Limited (2013), http:\/\/www.portioresearch.com\/media\/3986\/Portio%20Research%20Mobile%20Factbook%202013.pdf"},{"issue":"6","key":"17_CR12","first-page":"801","volume":"11","author":"P.-Y. Quenette","year":"1990","unstructured":"Quenette, P.-Y.: Functions of vigilance behaviour in mammals: A review. Acta Oecologica\u00a011(6), 801\u2013818 (1990)","journal-title":"Acta Oecologica"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1006\/anbe.2001.1772","volume":"62","author":"R.L. Robinette","year":"2001","unstructured":"Robinette, R.L., Ha, J.C.: Social and Ecological Factors Influencing Vigilance by Northwestern Crows, Corvus Caurinus. Animal Behaviour\u00a062, 447\u2013453 (2001)","journal-title":"Animal Behaviour"},{"key":"17_CR14","first-page":"47","volume":"11","author":"J. Sch","year":"2011","unstructured":"Sch, J., Hecht, B., Matthias, B., Fachhochschule, M.: Falling Asleep with Angry Birds, Facebook and Kindle - A Large Scale Study on Mobile Application Usage. Measurement\u00a011, 47\u201356 (2011)","journal-title":"Measurement"},{"issue":"7","key":"17_CR15","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1016\/S0167-4048(01)00712-X","volume":"20","author":"E.E. Schultz","year":"2001","unstructured":"Schultz, E.E., Proctor, R.W., Lien, M., Salvendy, G.: Usability and Security: An Appraisal of Usability Issues in Information Security Methods. Computers & Security\u00a020(7), 620\u2013634 (2001)","journal-title":"Computers & Security"},{"key":"17_CR16","volume-title":"Alone Together","author":"S. Turkle","year":"2011","unstructured":"Turkle, S.: Alone Together. Basic Books, New York (2011)"},{"key":"17_CR17","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1518\/001872008X312152","volume":"50","author":"J.S. Warm","year":"2008","unstructured":"Warm, J.S., Parasuraman, R., Matthews, G.: Vigilance Requires Hard Mental Work and Is Stressful. Human Factors\u00a050, 433\u2013441 (2008)","journal-title":"Human Factors"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Weinger, M.B., Slagle, J.: Human Factors Research in Anesthesia Patient Safety. J. Am. Med. Inform. Assoc.\u00a09, S58\u2013S63 (2002)","DOI":"10.1197\/jamia.M1229"},{"key":"17_CR19","first-page":"239","volume-title":"Attention and Performance VIII","author":"C.D. Wickens","year":"1980","unstructured":"Wickens, C.D.: The structure of Attentional Resources. In: Nickerson, R. (ed.) Attention and Performance VIII, pp. 239\u2013257. Lawrence Erlbaum, Hillsdale (1980)"},{"key":"17_CR20","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195130492.001.0001","volume-title":"Orienting of Attention","author":"R.D. Wright","year":"2008","unstructured":"Wright, R.D., Ward, L.M.: Orienting of Attention. Oxford University Press, Oxford (2008)"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction. Applications and Services"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07227-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T16:11:18Z","timestamp":1716826278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07227-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319072265","9783319072272"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07227-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}