{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:02:44Z","timestamp":1743019364473,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319444468"},{"type":"electronic","value":"9783319444475"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-44447-5_10","type":"book-chapter","created":{"date-parts":[[2016,8,27]],"date-time":"2016-08-27T09:32:32Z","timestamp":1472290352000},"page":"96-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Community Assets Infrastructure for the Secure Use of Mobile Computing Devices in the Rural Health Landscape"],"prefix":"10.1007","author":[{"given":"Kevin","family":"Kativu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dalenca","family":"Pottas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,8,28]]},"reference":[{"issue":"1","key":"10_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.3923\/jmcomm.2010.17.22","volume":"4","author":"K Agbele","year":"2010","unstructured":"Agbele, K., Nyongesa, H., Adesina, A.: lCT and information security perspectives in E-Health systems. J. Mob. Commun. 4(1), 17\u201322 (2010)","journal-title":"J. Mob. Commun."},{"issue":"2","key":"10_CR2","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1093\/heapro\/dak002","volume":"21","author":"G Bauer","year":"2006","unstructured":"Bauer, G., Davies, J.K., Pelikan, J.: The EUHPID Health Development Model for the classification of public health indicators. Health Promot. Int. 21(2), 153\u2013159 (2006)","journal-title":"Health Promot. Int."},{"issue":"6","key":"10_CR3","first-page":"4","volume":"8","author":"R Braun","year":"2013","unstructured":"Braun, R., Catalani, C., Wimbush, J., Israelski, D.: Community health workers and mobile technology: a systematic review of the literature. PLoS ONE 8(6), 4\u20139 (2013)","journal-title":"PLoS ONE"},{"issue":"1","key":"10_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1177\/1403494808098919","volume":"37","author":"\u00c5 Brings\u00e9n","year":"2009","unstructured":"Brings\u00e9n, \u00c5., Andersson, H.I., Ejlertsson, G.: Development and quality analysis of the Salutogenic Health Indicator Scale (SHIS). Scand. J. Public Health 37(1), 13\u201319 (2009)","journal-title":"Scand. J. Public Health"},{"issue":"4","key":"10_CR5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1257\/jep.14.4.23","volume":"14","author":"E Brynjolfsson","year":"2000","unstructured":"Brynjolfsson, E., Hitt, L.M.: Beyond computation: information technology, organizational transformation and business performance. J. Econ. Perspect. 14(4), 23\u201348 (2000)","journal-title":"J. Econ. Perspect."},{"key":"10_CR6","unstructured":"D\u2019Arcy, P.: CIO strategies for consumerization: the future of enterprise mobile computing (Whitepaper).Dell (2011)"},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.protcy.2013.12.005","volume":"9","author":"G Disterer","year":"2013","unstructured":"Disterer, G., Kleiner, C.: BYOD Bring Your Own Device. Procedia Technol. 9, 43\u201353 (2013)","journal-title":"Procedia Technol."},{"key":"10_CR8","unstructured":"Glasgow Center for Population Healthcph. Asset based approaches for health improvement: rederessing the balance, 1\u201324 October 2011"},{"key":"10_CR9","unstructured":"Gens, F., Levitas, D., Segal, R.: 2011 Consumerization of IT Study: Closing the \u201cConsumerization Gap.\u201d A report by IDC, sponsored by Unysis (2011)"},{"issue":"7","key":"10_CR10","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.1016\/j.socscimed.2004.11.062","volume":"61","author":"L Gilson","year":"2005","unstructured":"Gilson, L., Palmer, N., Schneider, H.: Trust and health worker performance: exploring a conceptual framework using South African evidence. Soc. Sci. Med. 61(7), 1418\u20131429 (2005)","journal-title":"Soc. Sci. Med."},{"key":"10_CR11","unstructured":"Harris, J., Ives, B., Junglas, I.: The genie is out of the bottle: managing the infiltration of consumer IT into the workforce (Whitepaper). Accenture Institute for High Performance (2011)"},{"issue":"2","key":"10_CR12","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","volume":"47","author":"T Herath","year":"2009","unstructured":"Herath, T., Rao, H.R.: Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decis. Support Syst. 47(2), 154\u2013165 (2009)","journal-title":"Decis. Support Syst."},{"key":"10_CR13","first-page":"373","volume":"37","author":"E Jovanov","year":"2001","unstructured":"Jovanov, E., Raskovic, D., Price, J., Chapman, J., Moore, A., Krishnamurthy, A.: Patient monitoring using personal area networks of wireless intelligent sensors. Biomed. Sci. Instrum. 37, 373\u2013378 (2001)","journal-title":"Biomed. Sci. Instrum."},{"issue":"3","key":"10_CR14","doi-asserted-by":"crossref","first-page":"14","DOI":"10.22215\/timreview\/771","volume":"4","author":"Sarah Marshall","year":"2014","unstructured":"Marshall, S.: IT consumerization: a case study of BYOD in a healthcare setting. Technology Innovation Management Review, pp. 14\u201318, March 2014","journal-title":"Technology Innovation Management Review"},{"issue":"2 Suppl","key":"10_CR15","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1177\/10253823070140020701x","volume":"4","author":"A Morgan","year":"2007","unstructured":"Morgan, A., Ziglio, E.: Revitalising the evidence base for public health: an assets model. Promot. Educ. 4(2 Suppl), 17\u201322 (2007)","journal-title":"Promot. Educ."},{"issue":"12","key":"10_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(12)70111-3","volume":"2012","author":"B Morrow","year":"2012","unstructured":"Morrow, B.: BYOD security challenges: control and protect your most sensitive data. Netw. Secur. 2012(12), 5\u20138 (2012)","journal-title":"Netw. Secur."},{"issue":"5","key":"10_CR17","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.cose.2004.05.002","volume":"23","author":"B Von Solms","year":"2004","unstructured":"Von Solms, B., Von Solms, R.: The 10 deadly sins of information security management. Comput. Secur. 23(5), 371\u2013376 (2004)","journal-title":"Comput. Secur."},{"issue":"3","key":"10_CR18","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.cose.2004.01.012","volume":"23","author":"C Vroom","year":"2004","unstructured":"Vroom, C., Von Solms, R.: Towards information security behavioural compliance. Comput. Secur. 23(3), 191\u2013198 (2004)","journal-title":"Comput. Secur."},{"issue":"3","key":"10_CR19","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1023\/B:HCMS.0000039381.02400.49","volume":"7","author":"N Wickramasinghe","year":"2004","unstructured":"Wickramasinghe, N., Davison, G.: Making explicit the implicit knowledge assets in healthcare: the case of multidisciplinary teams in care and cure environments. Health Care Manag. Sci. 7(3), 185\u2013195 (2004)","journal-title":"Health Care Manag. Sci."}],"container-title":["IFIP Advances in Information and Communication Technology","ICT for Promoting Human Development and Protecting the Environment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-44447-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,29]],"date-time":"2020-08-29T00:09:01Z","timestamp":1598659741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-44447-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319444468","9783319444475"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-44447-5_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"28 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WITFOR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP World Information Technology Forum","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Jos\u00e9","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Costa Rica","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"witfor2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}