{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T17:59:33Z","timestamp":1761155973437,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319210056"},{"type":"electronic","value":"9783319210063"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21006-3_51","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T05:46:42Z","timestamp":1437371202000},"page":"537-548","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Health Information Tailoring and Data Privacy in a Smart Watch as a Preventive Health Tool"],"prefix":"10.1007","author":[{"given":"HongSuk","family":"Yoon","sequence":"first","affiliation":[]},{"given":"Dong-Hee","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Hyup","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"issue":"2","key":"51_CR1","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.amepre.2008.05.001","volume":"35","author":"K Patrick","year":"2008","unstructured":"Patrick, K., Griswold, W.G., Raab, F., Intille, S.S.: Health and the mobile phone. Am. J. Prev. Med. 35(2), 177\u2013181 (2008)","journal-title":"Am. J. Prev. Med."},{"issue":"2","key":"51_CR2","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/S0749-3797(00)00188-4","volume":"19","author":"MJ Fotheringham","year":"2000","unstructured":"Fotheringham, M.J., Owies, D., Leslie, E., Owen, N.: Interactive health communication in preventive medicine: Internet-based strategies in teaching and research. Am. J. Prev. Med. 19(2), 113\u2013120 (2000)","journal-title":"Am. J. Prev. Med."},{"key":"51_CR3","unstructured":"Haddadi, H., Mortier, R., McAuley, D., Crowcroft, J.: Human-data interaction. Technical report, University of Cambridge, Computer Laboratory (2013)"},{"issue":"1","key":"51_CR4","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s007790200002","volume":"6","author":"MT Raghunath","year":"2002","unstructured":"Raghunath, M.T., Narayanaswami, C.: User interfaces for applications on a wrist watch. Pers. Ubiquit. Comput. 6(1), 17\u201330 (2002)","journal-title":"Pers. Ubiquit. Comput."},{"key":"51_CR5","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.procs.2012.06.040","volume":"10","author":"D Bonino","year":"2012","unstructured":"Bonino, D., Corno, F., De Russis, L.: dwatch: A personal wrist watch for smart environments. Procedia Comput. Sci. 10, 300\u2013307 (2012)","journal-title":"Procedia Comput. Sci."},{"key":"51_CR6","unstructured":"Microsoft Jumps into Growing Market for Wearable Fitness Technology. The New York Times, \n                      http:\/\/www.nytimes.com\/2014\/10\/30\/business\/microsoft-jumps-into-the-growing-market-for-wearable-fitness-technology.html?_r=1"},{"key":"51_CR7","unstructured":"Success of Apple\u2019s iWatch May Rely on Health Care Partnerships. The New York Times, \n                      http:\/\/www.nytimes.com\/2014\/09\/08\/technology\/can-apple-build-a-cool-and-convenient-iwatch.html"},{"key":"51_CR8","unstructured":"A Growing Role in Health Care for Smartwatches. The New York Times, \n                      http:\/\/www.nytimes.com\/2014\/01\/21\/fashion\/a-growing-role-in-health-care-for-smartwatches.html?_r=1"},{"issue":"3","key":"51_CR9","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1093\/her\/cyn004","volume":"23","author":"RP Hawkins","year":"2008","unstructured":"Hawkins, R.P., Kreuter, M., Resnicow, K., Fishbein, M., Dijkstra, A.: Understanding tailoring in communicating about health. Health Educ. Res. 23(3), 454\u2013466 (2008)","journal-title":"Health Educ. Res."},{"issue":"4","key":"51_CR10","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1037\/0033-2909.133.4.673","volume":"133","author":"SM Noar","year":"2007","unstructured":"Noar, S.M., Benac, C.N., Harris, M.S.: Does tailoring matter? Meta-analytic review of tailored print health behavior change interventions. Psychol. Bull. 133(4), 673\u2013693 (2007)","journal-title":"Psychol. Bull."},{"key":"51_CR11","unstructured":"Serino, C.M., Furner, C.P., Smatt, C.: Making it personal: how personalization affects trust over time. In: Proceedings 38th Annual Hawaii International Conference on System Sciences, pp. 170a\u2013170a. IEEE (2005)"},{"issue":"3","key":"51_CR12","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1111\/j.1468-2958.2010.01377.x","volume":"36","author":"SS Sundar","year":"2010","unstructured":"Sundar, S.S., Marathe, S.S.: Personalization versus customization: the importance of agency, privacy, and power usage. Hum. Commun. Res. 36(3), 298\u2013322 (2010)","journal-title":"Hum. Commun. Res."},{"key":"51_CR13","unstructured":"Personalization is over-rated. Jakob Nielsen\u2019s Alertbox, \n                      http:\/\/www.nngroup.com\/articles\/personalization-is-over-rated"},{"key":"51_CR14","volume-title":"Self as Source: Agency and Customization in Interactive Media","author":"SS Sunder","year":"2008","unstructured":"Sunder, S.S.: Self as Source: Agency and Customization in Interactive Media. Routledge, New York (2008)"},{"key":"51_CR15","doi-asserted-by":"crossref","unstructured":"Treiblmaier, H., Madlberger, M., Knotzer, N., Pollach, I.: Evaluating personalization and customization from an ethical point of view: an empirical study. In: Proceedings 37th Annual Hawaii International Conference on System Sciences, pp. 1\u201310. IEEE (2004)","DOI":"10.1109\/HICSS.2004.1265434"},{"issue":"1","key":"51_CR16","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.elerap.2004.10.008","volume":"4","author":"HK Bhargava","year":"2005","unstructured":"Bhargava, H.K., Feng, J.: America online\u2019s internet access service: how to deter unwanted customers. Electron. Commer. Res. Appl. 4(1), 35\u201348 (2005)","journal-title":"Electron. Commer. Res. Appl."},{"key":"51_CR17","unstructured":"Marathe, S.S., Sundar, S. S., Bijvank, M.N., van Vugt, H., Veldhuis, J.: Who are these power users anyway? Building a psychological profile. In: Proceedings 57th Annual Conference of the International Communication Association (2007)"},{"issue":"4","key":"51_CR18","doi-asserted-by":"publisher","first-page":"1356","DOI":"10.1016\/j.chb.2012.02.021","volume":"28","author":"Y Kim","year":"2012","unstructured":"Kim, Y., Sundar, S.S.: Visualizing ideal self vs. actual self through avatars: Impact on preventive health outcomes. Comput. Hum. Behav. 28(4), 1356\u20131364 (2012)","journal-title":"Comput. Hum. Behav."},{"key":"51_CR19","volume-title":"Motivational technologies: a theoretical framework for designing preventive health applications","author":"SS Sundar","year":"2012","unstructured":"Sundar, S.S., Bellur, S., Jia, H.: Motivational technologies: a theoretical framework for designing preventive health applications. Springer, Berlin Heidelberg (2012)"},{"issue":"2\u20133","key":"51_CR20","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10799-005-5879-y","volume":"6","author":"RK Chellappa","year":"2005","unstructured":"Chellappa, R.K., Sin, R.G.: Personalization versus privacy: An empirical examination of the online consumer\u2019s dilemma. Inf. Technol. Manage. 6(2\u20133), 181\u2013202 (2005)","journal-title":"Inf. Technol. Manage."},{"issue":"1","key":"51_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/07370020903586662","volume":"25","author":"AN Joinson","year":"2010","unstructured":"Joinson, A.N., Reips, U.D., Buchanan, T., Schofield, C.B.P.: Privacy, trust, and self-disclosure online. Hum. Comput. Interact. 25(1), 1\u201324 (2010)","journal-title":"Hum. Comput. Interact."},{"issue":"12","key":"51_CR22","first-page":"798","volume":"12","author":"H Xu","year":"2011","unstructured":"Xu, H., Dinev, T., Smith, J., Hart, P.: Information privacy concerns: linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst. 12(12), 798\u2013824 (2011)","journal-title":"J. Assoc. Inf. Syst."},{"issue":"1","key":"51_CR23","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1111\/j.1745-6606.2001.tb00101.x","volume":"35","author":"AD Miyazaki","year":"2001","unstructured":"Miyazaki, A.D., Fernandez, A.: Consumer perceptions of privacy and security risks for online shopping. J. Consum. Aff. 35(1), 27\u201344 (2001)","journal-title":"J. Consum. Aff."},{"issue":"4","key":"51_CR24","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336\u2013355 (2004)","journal-title":"Inf. Syst. Res."},{"key":"51_CR25","doi-asserted-by":"crossref","unstructured":"Solove, D.J.: A taxonomy of privacy. University of Pennsylvania law review (2006)","DOI":"10.2307\/40041279"},{"issue":"1","key":"51_CR26","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1080\/10196780500491162","volume":"16","author":"SY Ho","year":"2006","unstructured":"Ho, S.Y.: The attraction of internet personalization to web users. Electron. Markets. 16(1), 41\u201350 (2006)","journal-title":"Electron. Markets."},{"issue":"13","key":"51_CR27","doi-asserted-by":"publisher","first-page":"2078","DOI":"10.1002\/asi.20672","volume":"58","author":"MJ Metzger","year":"2007","unstructured":"Metzger, M.J.: Making sense of credibility on the web: models for evaluating online information and recommendations for future research. J. Am. Soc. Inform. Sci. Technol. 58(13), 2078\u20132091 (2007)","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"key":"51_CR28","doi-asserted-by":"crossref","DOI":"10.4135\/9780857020093","volume-title":"The Quality of Qualitative Research: Introducing qualitative methods","author":"C Seale","year":"1999","unstructured":"Seale, C.: The Quality of Qualitative Research: Introducing qualitative methods. Sage, London (1999)"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction: Users and Contexts"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21006-3_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:18:43Z","timestamp":1582413523000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-21006-3_51"}},"subtitle":["Qualitative Study of Users\u2019 Perceptions and Attitudes"],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319210056","9783319210063"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21006-3_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}