{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T12:40:07Z","timestamp":1751287207100,"version":"3.41.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319747804"},{"type":"electronic","value":"9783319747811"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74781-1_8","type":"book-chapter","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T15:22:24Z","timestamp":1517498544000},"page":"101-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["What Belongs to Context?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5612-6794","authenticated-orcid":false,"given":"S\u00e9linde","family":"van Engelenburg","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6211-8790","authenticated-orcid":false,"given":"Marijn","family":"Janssen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1999-743X","authenticated-orcid":false,"given":"Bram","family":"Klievink","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,2]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/65.313011","volume":"8","author":"BN Schilit","year":"1994","unstructured":"Schilit, B.N., Theimer, M.M.: Disseminating active map information to mobile hosts. IEEE Netw. 8, 22\u201332 (1994)","journal-title":"IEEE Netw."},{"key":"8_CR2","doi-asserted-by":"crossref","first-page":"8509","DOI":"10.1016\/j.eswa.2008.10.071","volume":"36","author":"J-Y Hong","year":"2009","unstructured":"Hong, J.-Y., Suh, E.-H., Kim, S.-J.: Context-aware systems: a literature review and classification. Expert Syst. Appl. 36, 8509\u20138522 (2009)","journal-title":"Expert Syst. Appl."},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/3-540-48157-5_29","volume-title":"Handheld and Ubiquitous Computing","author":"GD Abowd","year":"1999","unstructured":"Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol. 1707, pp. 304\u2013307. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48157-5_29"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1007\/978-3-540-74255-5_42","volume-title":"Modeling and Using Context","author":"A Zimmermann","year":"2007","unstructured":"Zimmermann, A., Lorenz, A., Oppermann, R.: An operational definition of context. In: Kokinov, B., Richardson, D.C., Roth-Berghofer, T.R., Vieu, L. (eds.) CONTEXT 2007. LNCS (LNAI), vol. 4635, pp. 558\u2013571. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74255-5_42"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/11508373_5","volume-title":"Modeling and Using Context","author":"P Br\u00e9zillon","year":"2005","unstructured":"Br\u00e9zillon, P.: Task-realization models in contextual graphs. In: Dey, A., Kokinov, B., Leake, D., Turner, R. (eds.) CONTEXT 2005. LNCS (LNAI), vol. 3554, pp. 55\u201368. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11508373_5"},{"key":"8_CR6","unstructured":"Kerer, C., Dustdar, S., Jazayeri, M., Gomes, D., Szego, A., Caja, J.A.B.: Presence-aware infrastructure using web services and RFID technologies. In: Proceedings of 2nd European Workshop on Object Orientation and Web Services (2004)"},{"key":"8_CR7","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1023\/A:1019194325861","volume":"3","author":"GD Abowd","year":"1997","unstructured":"Abowd, G.D., Atkeson, C.G., Hong, J., Long, S., Kooper, R., Pinkerton, M.: Cyberguide: a mobile context-aware tour guide. Wirel. Netw. 3, 421\u2013433 (1997)","journal-title":"Wirel. Netw."},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-662-49224-6_11","volume-title":"Software Engineering and Formal Methods","author":"S Engelenburg van","year":"2015","unstructured":"van Engelenburg, S., Janssen, M., Klievink, B.: Design of a business-to-government information sharing architecture using business rules. In: Bianculli, D., Calinescu, R., Rumpe, B. (eds.) SEFM 2015. LNCS, vol. 9509, pp. 124\u2013138. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-49224-6_11"},{"key":"8_CR9","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1207\/S15327051HCI16234_18","volume":"16","author":"T Winograd","year":"2001","unstructured":"Winograd, T.: Architectures for context. Hum.-Comput. Interact. 16, 401\u2013419 (2001)","journal-title":"Hum.-Comput. Interact."},{"key":"8_CR10","unstructured":"Wang, Y.-K.: Context awareness and adaptation in mobile learning. In: 2nd IEEE International Workshop on Wireless and Mobile Technologies in Education, pp. 154\u2013158 (2004)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/3-540-45809-3_9","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"JL Crowley","year":"2002","unstructured":"Crowley, J.L., Coutaz, J., Rey, G., Reignier, P.: Perceptual components for context aware computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 117\u2013134. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45809-3_9"},{"key":"8_CR12","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s10660-010-9050-4","volume":"10","author":"P Benou","year":"2010","unstructured":"Benou, P., Vassilakis, C.: The conceptual model of context for mobile commerce applications. Electron. Commer. Res. 10, 139\u2013165 (2010)","journal-title":"Electron. Commer. Res."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Yang, Z., Qilun, Z., Fagui, L.: An extended context model in a RFID-based context-aware service system. In: Proceedings - 2nd 2008 International Symposium on Intelligent Information Technology Application Workshop, IITA 2008 Workshop, Shanghai, pp. 693\u2013697 (2008)","DOI":"10.1109\/IITA.Workshops.2008.255"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Khedo, K.K.: Context-aware systems for mobile and ubiquitous networks. In: International Conference on Networking, International Conference on Systems, International Conference on Mobile Communications and Learning Technologies, p. 123 (2006)","DOI":"10.1109\/ICNICONSMCL.2006.68"},{"key":"8_CR15","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s00779-003-0253-8","volume":"8","author":"P Dourish","year":"2004","unstructured":"Dourish, P.: What we talk about when we talk about context. Pers. Ubiquitous Comput. 8, 19\u201330 (2004)","journal-title":"Pers. Ubiquitous Comput."},{"key":"8_CR16","doi-asserted-by":"crossref","first-page":"1119","DOI":"10.1016\/j.eswa.2010.05.006","volume":"38","author":"V Vieira","year":"2011","unstructured":"Vieira, V., Tedesco, P., Salgado, A.C.: Designing context-sensitive systems: an integrated approach. Expert Syst. Appl. 38, 1119\u20131138 (2011)","journal-title":"Expert Syst. Appl."},{"key":"8_CR17","first-page":"223","volume":"62","author":"P Br\u00e9zillon","year":"1999","unstructured":"Br\u00e9zillon, P., Pomerol, J.: Contextual knowledge sharing and cooperation in intelligent assistant systems. Le Travail Humain 62, 223\u2013246 (1999)","journal-title":"Le Travail Humain"},{"key":"8_CR18","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1080\/07370024.2014.896709","volume":"29","author":"JS Bauer","year":"2014","unstructured":"Bauer, J.S., Newman, M.W., Kientz, J.A.: What designers talk about when they talk about context. Hum.-Comput. Interact. 29, 420\u2013450 (2014)","journal-title":"Hum.-Comput. Interact."},{"key":"8_CR19","unstructured":"Object. https:\/\/www.merriam-webster.com\/dictionary\/object"},{"key":"8_CR20","unstructured":"Attribute. https:\/\/www.merriam-webster.com\/dictionary\/attribute"},{"key":"8_CR21","unstructured":"Orilia, F., Swoyer, C.: Properties. Stanford Encyclopedia of Philosophy. Metaphysics Research Lab, Stanford University (2016)"},{"key":"8_CR22","first-page":"1","volume-title":"Rethinking Context: An Introduction. Rethinking Context: Language as an Interactive Phenomenon","author":"C Goodwin","year":"1992","unstructured":"Goodwin, C., Duranti, A.: Rethinking Context: An Introduction. Rethinking Context: Language as an Interactive Phenomenon, pp. 1\u201342. Cambridge University Press, Cambridge (1992)"},{"key":"8_CR23","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s007790170019","volume":"1","author":"AK Dey","year":"2001","unstructured":"Dey, A.K.: Understanding and using context. Pers. Ubiquitous Comput. 1, 4\u20137 (2001)","journal-title":"Pers. Ubiquitous Comput."},{"key":"8_CR24","first-page":"3","volume":"4","author":"D Hesketh","year":"2010","unstructured":"Hesketh, D.: Weaknesses in the supply chain: who packed the box. World Cust. J. 4, 3\u201320 (2010)","journal-title":"World Cust. J."},{"key":"8_CR25","first-page":"1","volume-title":"The World the Box Made. The Box: How the Shipping Container Made the World Smaller and the World Economy Bigger","author":"M Levinson","year":"2010","unstructured":"Levinson, M.: The World the Box Made. The Box: How the Shipping Container Made the World Smaller and the World Economy Bigger, pp. 1\u201315. Princeton University Press, Princeton (2010)"},{"key":"8_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15669-4","volume-title":"Accelerating Global Supply Chains with IT-Innovation","author":"Y-H Tan","year":"2011","unstructured":"Tan, Y.-H., Bj\u00f8rn-Andersen, N., Klein, S., Rukanova, B.: Accelerating Global Supply Chains with IT-Innovation. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-15669-4"},{"key":"8_CR27","doi-asserted-by":"crossref","first-page":"14","DOI":"10.4018\/jegr.2012100102","volume":"8","author":"B Klievink","year":"2012","unstructured":"Klievink, B., van Stijn, E., Hesketh, D., Aldewereld, H., Overbeek, S., Heijmann, F., Tan, Y.-H.: Enhancing visibility in international supply chains: the data pipeline concept. Int. J. Electron. Gov. Res. 8, 14\u201333 (2012)","journal-title":"Int. J. Electron. Gov. Res."},{"key":"8_CR28","doi-asserted-by":"crossref","first-page":"S9","DOI":"10.1016\/j.giq.2012.08.006","volume":"30","author":"N Bharosa","year":"2013","unstructured":"Bharosa, N., Janssen, M., van Wijk, R., de Winne, N., van der Voort, H., Hulstijn, J., Tan, Y.-H.: Tapping into existing information flows: the transformation to compliance by design in business-to-government information exchange. Gov. Inf. Q. 30, S9\u2013S18 (2013)","journal-title":"Gov. Inf. Q."},{"key":"8_CR29","unstructured":"Customs Administration of the Netherlands: Pushing Boundaries: The Customs Administration of The Netherlands\u2019 Point on the Horizon for the Enforcement on Continuously Increasing Flows of Goods (2014)"},{"key":"8_CR30","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1504\/IJAHUC.2007.014070","volume":"2","author":"M Baldauf","year":"2007","unstructured":"Baldauf, M., Dustdar, S., Rosenberg, F.: A survey on context-aware systems. Int. J. Ad Hoc Ubiquitous Comput. 2, 263 (2007)","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Cheverst, K., Davies, N., Mitchell, K., Friday, A., Efstratiou, C.: Developing a context-aware electronic tourist guide. In: Proceedings of SIGCHI Conference on Human Factors Computing Systems - CHI 2000, pp. 17\u201324 (2000)","DOI":"10.1145\/332040.332047"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74781-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T12:02:50Z","timestamp":1751284970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74781-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319747804","9783319747811"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74781-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}