{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:26:35Z","timestamp":1743110795274,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642217159"},{"type":"electronic","value":"9783642217166"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21716-6_11","type":"book-chapter","created":{"date-parts":[[2011,6,26]],"date-time":"2011-06-26T13:32:43Z","timestamp":1309095163000},"page":"99-108","source":"Crossref","is-referenced-by-count":6,"title":["Healthcare and Security: Understanding and Evaluating the Risks"],"prefix":"10.1007","author":[{"given":"Aubrey","family":"Baker","sequence":"first","affiliation":[]},{"given":"Laurian","family":"Vega","sequence":"additional","affiliation":[]},{"given":"Tom","family":"DeHart","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Harrison","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Adams, Blandford: Bridging the gap between organizational and user perspectives of security in the clinical domain. IJHCS 63(1-2) (2005)","DOI":"10.1016\/j.ijhcs.2005.04.022"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Adams, Sasse: Users are not the enemy. Communications of the ACM (1999)","DOI":"10.1145\/322796.322806"},{"key":"11_CR3","volume-title":"Conference on CSCW","author":"Bellotti","year":"1993","unstructured":"Bellotti, Sellen: Design for Privacy in Ubiquitous Computing Environments. In: Conference on CSCW. Kluwer Academic Publishers, Dordrecht (1993)"},{"key":"11_CR4","volume-title":"Conference on Human Factors in Comp. Sys.","author":"Palen","year":"2003","unstructured":"Palen, Dourish: Unpacking \u201cprivacy\u201d for a networked world. In: Conference on Human Factors in Comp. Sys. ACM, Florida (2003)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Starks, Trinidad: Choose your method: A comparison of phenomenology, discourse analysis, and grounded theory. Qual. Health Res. 17(10) (2007)","DOI":"10.1177\/1049732307307031"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Carayon: Human factors of complex socio-technical systems. Applied Ergonomics 37(4) (2006)","DOI":"10.1016\/j.apergo.2006.04.011"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Berner, Detmer, Simborg: Will the Wave Finally Break? A Brief View of the Adoption of Electronic Medical Records in the United States. JAMIA 12(1) (2005)","DOI":"10.1197\/jamia.M1664"},{"key":"11_CR8","volume-title":"OZCHI","author":"Satchell","year":"2009","unstructured":"Satchell, Dourish: Beyond the user: Use and non-use in HCI. In: OZCHI. ACM, Melbourne (2009)"},{"key":"11_CR9","unstructured":"Merrill: Experts name top 7 trends in health information privacy for 2011. Healthcare IT News (2011), \n                    \n                      http:\/\/bit.ly\/faClsS\n                    \n                    \n                   (accessed January 10, 2011)"},{"key":"11_CR10","unstructured":"Heidegger, M.: Being and Time, Harper Perennial Modern Classics (2008)"},{"issue":"3","key":"11_CR11","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1093\/jmp\/12.3.219","volume":"12","author":"Toombs","year":"1987","unstructured":"Toombs: The Meaning of Illness: A Phenomenological Approach to the Patient-Physician Relationship. J. of Medicine and Philosophy\u00a012(3), 219\u2013240 (1987)","journal-title":"J. of Medicine and Philosophy"},{"key":"11_CR12","volume-title":"Researching lived experience: Human science for action sensitive pedagogy","author":"Manen van","year":"1990","unstructured":"van Manen: Researching lived experience: Human science for action sensitive pedagogy. State University of New York Press, New York (1990)"},{"issue":"2","key":"11_CR13","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1080\/01972240802701585","volume":"25","author":"Friesen","year":"2009","unstructured":"Friesen, Feenberg, Smith: Phenomenology and Surveillance Studies: Returning to the Things Themselves. Information Society\u00a025(2), 84\u201390 (2009)","journal-title":"Information Society"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Bardram: Applications of Context-Aware Computing in Hospital Work - Examples and Design Principles. In: ACM Symposium on Applied Computing, pp. 1574\u20131579 (2004)","DOI":"10.1145\/967900.968215"},{"key":"11_CR15","volume-title":"Divide and Conquer: The Role of Trust and Assurance in the Design of Secure Socio-Technical Systems","author":"Flechais","year":"2006","unstructured":"Flechais, Riegelsberger, Sasse: Divide and Conquer: The Role of Trust and Assurance in the Design of Secure Socio-Technical Systems. AMC, Lake Arrowhead (2006)"},{"key":"11_CR16","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587126","volume-title":"A Finger on the Pulse: Temporal Rhythms and Information Seeking in Medical Work","author":"Reddy","year":"2002","unstructured":"Reddy, Dourish: A Finger on the Pulse: Temporal Rhythms and Information Seeking in Medical Work. ACM, New Orleans (2002)"}],"container-title":["Lecture Notes in Computer Science","Ergonomics and Health Aspects of Work with Computers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21716-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T22:20:39Z","timestamp":1582410039000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21716-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642217159","9783642217166"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21716-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}