{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T01:08:41Z","timestamp":1768266521682,"version":"3.49.0"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319233437","type":"print"},{"value":"9783319233444","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23344-4_36","type":"book-chapter","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T10:47:53Z","timestamp":1440067673000},"page":"369-378","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Witnesses for the Doctor in the Loop"],"prefix":"10.1007","author":[{"given":"Peter","family":"Kieseberg","sequence":"first","affiliation":[]},{"given":"Johannes","family":"Schantl","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Fr\u00fchwirt","sequence":"additional","affiliation":[]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Holzinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,21]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSECP.2003.1203228","volume":"1","author":"SW Smith","year":"2003","unstructured":"Smith, S.W.: Humans in the loop: Human-computer interaction and security. IEEE Security & Privacy, 1, 75\u201379 (2003)","journal-title":"IEEE Security & Privacy,"},{"key":"36_CR2","unstructured":"Lupiana, D.: Development of a framework to leverage knowledge management systems to improve security awareness (2008)"},{"key":"36_CR3","unstructured":"Clark, S., Goodspeed, T., Metzger, P., Wasserman, Z., Xu, K., Blaze, M.: Why (special agent) johnny (still) can\u2019t encrypt: A security analysis of the apco project 25 two-way radio system. In: USENIX Security Symposium, Citeseer (2011)"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Kieseberg, P., Hobel, H., Schrittwieser, S., Weippl, E., Holzinger, A.: Protecting Anonymity in Data-Driven Biomedical Science. In: Holzinger, A., Jurisica, I. (eds.) Interactive Knowledge Discovery and Data Mining in Biomedical Informatics. LNCS, vol. 8401, pp. 301\u2013316. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-662-43968-5_17"},{"key":"36_CR5","unstructured":"Randeree, E.: Secure health knowledge: Balancing security, privacy and access. In: AMCIS 2005 Proceedings, 287 (2005)"},{"key":"36_CR6","unstructured":"Warkentin, M., Johnston, A., Adams, A.: User interaction with healthcare information systems: Do healthcare professionals want to comply with hipaa? AMCIS 2006 Proceedings, 326 (2006)"},{"key":"36_CR7","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1016\/j.diin.2014.09.003","volume":"11","author":"P Fr\u00fchwirt","year":"2014","unstructured":"Fr\u00fchwirt, P., Kieseberg, P., Krombholz, K., Weippl, E.: Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations. Digital Investigation 11, 336\u2013348 (2014)","journal-title":"Digital Investigation"},{"key":"36_CR8","unstructured":"Hobel, H., Schrittwieser, S., Kieseberg, P., Weippl, E.: (Anonymity and pseudonymity in data-driven science)"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Heurix, J., Zimmermann, P., Neubauer, T., Fenz, S.: A taxonomy for privacy enhancing technologies. Computers & Security (2015)","DOI":"10.1016\/j.cose.2015.05.002"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Fruehwirt, P., Kieseberg, P., Schrittwieser, S., Huber, M., Weippl, E.: Innodb database forensics: Reconstructing data manipulation queries from redo logs. In: The Fifth International Workshop on Digital Forensics (WSDF) (2012)","DOI":"10.1109\/ARES.2012.50"}],"container-title":["Lecture Notes in Computer Science","Brain Informatics and Health"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23344-4_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T08:11:39Z","timestamp":1676967099000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23344-4_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319233437","9783319233444"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23344-4_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}