{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T15:04:06Z","timestamp":1758121446407,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333316"},{"type":"electronic","value":"9783642333323"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33332-3_11","type":"book-chapter","created":{"date-parts":[[2012,9,21]],"date-time":"2012-09-21T06:43:55Z","timestamp":1348209835000},"page":"111-122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Impact of ICT on Home Healthcare"],"prefix":"10.1007","author":[{"given":"Sokratis","family":"Vavilis","sequence":"first","affiliation":[]},{"given":"Milan","family":"Petkovi\u0107","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"11_CR1","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.infsof.2008.04.004","volume":"51","author":"P. Guarda","year":"2009","unstructured":"Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol.\u00a051(2), 337\u2013350 (2009)","journal-title":"Inf. Softw. Technol."},{"issue":"5","key":"11_CR2","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1056\/NEJMra050100","volume":"353","author":"L. Osterberg","year":"2005","unstructured":"Osterberg, L., Blaschke, T.: Adherence to medication. New England Journal of Medicine\u00a0353(5), 487\u2013497 (2005)","journal-title":"New England Journal of Medicine"},{"issue":"7\/8","key":"11_CR3","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1345\/aph.1H018","volume":"40","author":"L. Hess","year":"2006","unstructured":"Hess, L., Raebel, M., Conner, D., Malone, D.: Measurement of adherence in pharmacy administrative databases: a proposal for standard definitions and preferred measures. The Annals of Pharmacotherapy\u00a040(7\/8), 1280\u20131288 (2006)","journal-title":"The Annals of Pharmacotherapy"},{"issue":"1","key":"11_CR4","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/S0895-4356(96)00268-5","volume":"50","author":"J. Steiner","year":"1997","unstructured":"Steiner, J., Prochazka, A.: The assessment of refill compliance using pharmacy records: methods, validity, and applications. Journal of Clinical Epidemiology\u00a050(1), 105\u2013116 (1997)","journal-title":"Journal of Clinical Epidemiology"},{"issue":"6","key":"11_CR5","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1161\/01.HYP.0000222373.59104.3d","volume":"47","author":"M. Halpern","year":"2006","unstructured":"Halpern, M., Khan, Z., Schmier, J., Burnier, M., Caro, J., Cramer, J., Daley, W., Gurwitz, J., Hollenberg, N.: Recommendations for evaluating compliance and persistence with hypertension therapy using retrospective data. Hypertension\u00a047(6), 1039\u20131048 (2006)","journal-title":"Hypertension"},{"issue":"1","key":"11_CR6","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1179\/175709208X334614","volume":"1","author":"S. Leslie","year":"2008","unstructured":"Leslie, S., Gwadry-Sridhar, F., Thiebaud, P., Patel, B.: Calculating medication compliance, adherence and persistence in administrative pharmacy claims databases. Pharmaceutical Programming\u00a01(1), 13\u201319 (2008)","journal-title":"Pharmaceutical Programming"},{"issue":"8","key":"11_CR7","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1002\/pds.1230","volume":"15","author":"S. Andrade","year":"2006","unstructured":"Andrade, S., Kahler, K., Frech, F., Chan, K.: Methods for evaluation of medication adherence and persistence using automated databases. Pharmacoepidemiology and Drug Safety\u00a015(8), 565\u2013574 (2006)","journal-title":"Pharmacoepidemiology and Drug Safety"},{"key":"11_CR8","first-page":"318","volume-title":"Proceedings of the 21st IEEE International Symposium on Computer-Based Medical Systems","author":"T. Mabotuwana","year":"2008","unstructured":"Mabotuwana, T., Warren, J.: A Semantic Web Technology Based Approach to Identify Hypertensive Patients for Follow-Up\/Recall. In: Proceedings of the 21st IEEE International Symposium on Computer-Based Medical Systems, pp. 318\u2013323. IEEE Press, New York (2008)"},{"key":"11_CR9","first-page":"299","volume-title":"Proceedings of Annual International Conference of the IEEE Engineering in Medicine and Biology Society","author":"H. Reiter","year":"2009","unstructured":"Reiter, H., Maglaveras, N.: HeartCycle: Compliance and effectiveness in HF and CAD closed-loop management. In: Proceedings of Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 299\u2013302. IEEE Press, New York (2009)"},{"issue":"4","key":"11_CR10","first-page":"307","volume":"1","author":"C. Otto","year":"2005","unstructured":"Otto, C., Milenkovi\u0107, A., Sanders, C., Jovanov, E.: System architecture of a wireless body area sensor network for ubiquitous health monitoring. J. Mob. Multimed.\u00a01(4), 307\u2013326 (2005)","journal-title":"J. Mob. Multimed."},{"issue":"15","key":"11_CR11","doi-asserted-by":"publisher","first-page":"2688","DOI":"10.1016\/j.comnet.2010.05.003","volume":"54","author":"H. Alemdar","year":"2010","unstructured":"Alemdar, H., Ersoy, C.: Wireless sensor networks for healthcare: A survey. Comput. Netw.\u00a054(15), 2688\u20132710 (2010)","journal-title":"Comput. Netw."},{"issue":"5","key":"11_CR12","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1089\/tmj.2007.0076","volume":"14","author":"S. Schmidt","year":"2008","unstructured":"Schmidt, S., Sheikzadeh, S., Beil, B., Patten, M., Stettin, J.: Acceptance of telemonitoring to enhance medication compliance in patients with chronic heart failure. Telemedicine and e-Health\u00a014(5), 426\u2013433 (2008)","journal-title":"Telemedicine and e-Health"},{"key":"11_CR13","first-page":"1","volume-title":"Proceedings of the 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies","author":"Z. Pang","year":"2009","unstructured":"Pang, Z., Chen, Q., Zheng, L.: A pervasive and preventive healthcare solution for medication noncompliance and daily monitoring. In: Proceedings of the 2nd International Symposium on Applied Sciences in Biomedical and Communication Technologies, pp. 1\u20136. IEEE Press, New York (2009)"},{"issue":"2","key":"11_CR14","doi-asserted-by":"publisher","first-page":"110","DOI":"10.4304\/jetwi.1.2.110-118","volume":"1","author":"A. Mouttham","year":"2009","unstructured":"Mouttham, A., Peyton, L., Eze, B., Saddik, A.: Event-driven data integration for personal health monitoring. Journal of Emerging Technologies in Web Intelligence\u00a01(2), 110\u2013118 (2009)","journal-title":"Journal of Emerging Technologies in Web Intelligence"},{"key":"11_CR15","volume-title":"Use of text mining to predict patient compliance","author":"C. Petrou","year":"2008","unstructured":"Petrou, C.: Use of text mining to predict patient compliance. SAS Global Forum, ProQuest (2008)"},{"key":"11_CR16","first-page":"41","volume-title":"Proceedings of the 7th International Workshop on Security Measurements and Metrics","author":"S. Banescu","year":"2011","unstructured":"Banescu, S., Zannone, N.: Measuring privacy compliance with process specifications. In: Proceedings of the 7th International Workshop on Security Measurements and Metrics, pp. 41\u201350. IEEE Press, New York (2011)"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-642-23556-6_10","volume-title":"Secure Data Management","author":"M. Petkovi\u0107","year":"2011","unstructured":"Petkovi\u0107, M., Prandi, D., Zannone, N.: Purpose Control: Did You Process the Data for the Intended Purpose? In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2011. LNCS, vol.\u00a06933, pp. 145\u2013168. Springer, Heidelberg (2011)"},{"issue":"2","key":"11_CR18","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.entcs.2007.12.025","volume":"197","author":"T. van Deursen","year":"2008","unstructured":"van Deursen, T., Koster, P., Petkovi\u0107, M.: Hedaquin: A Reputation-based Health Data Quality Indicator. Electron. Notes Theor. Comput. Sci.\u00a0197(2), 159\u2013167 (2008)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"issue":"2","key":"11_CR19","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst.\u00a043(2), 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"11_CR20","unstructured":"J\u00f8sang, A.: Online reputation systems for the health sector. Electronic Journal of Health Informatics\u00a03(1), e8 (2008)"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Ebner, W., Leimeister, J.M., Krcmar, H.: Trust in Virtual Healthcare Communities: Design and Implementation of Trust-Enabling Functionalities. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, p. 70182a. IEEE Press, New York (2004)","DOI":"10.1109\/HICSS.2004.1265436"},{"issue":"2","key":"11_CR22","doi-asserted-by":"publisher","first-page":"64","DOI":"10.4067\/S0718-18762009000200006","volume":"4","author":"B. Alhaqbani","year":"2009","unstructured":"Alhaqbani, B., J\u00f8sang, A., Fidge, C.: A medical data reliability assessment model. J. Theor. Appl. Electron. Commer. Res.\u00a04(2), 64\u201378 (2009)","journal-title":"J. Theor. Appl. Electron. Commer. Res."},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-642-00887-0_2","volume-title":"Database Systems for Advanced Applications","author":"E. Bertino","year":"2009","unstructured":"Bertino, E., Dai, C., Kantarcioglu, M.: The Challenge of Assuring Data Trustworthiness. In: Zhou, X., Yokota, H., Deng, K., Liu, Q. (eds.) DASFAA 2009. LNCS, vol.\u00a05463, pp. 22\u201333. Springer, Heidelberg (2009)"},{"key":"11_CR24","first-page":"1525","volume-title":"Proceedings of the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society","author":"S.T. Moturu","year":"2008","unstructured":"Moturu, S.T., Liu, H., Johnson, W.G.: Trust evaluation in health information on the World Wide Web. In: Proceedings of the 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 1525\u20131528. IEEE Press, New York (2008)"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","volume-title":"Foundations of Security Analysis and Design","author":"P. Samarati","year":"2001","unstructured":"Samarati, P., de Capitani di Vimercati, S.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 137\u2013196. Springer, Heidelberg (2001)"},{"key":"11_CR26","first-page":"125","volume-title":"Proceedings of the 7th ACM Symposium on Access Control Models and Technologies","author":"L. Zhang","year":"2002","unstructured":"Zhang, L., Ahn, G.J., Chu, B.T.: A role-based delegation framework for healthcare information systems. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, pp. 125\u2013134. ACM, New York (2002)"},{"key":"11_CR27","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/CSFW.2004.1310738","volume-title":"Proceedings of the 17th IEEE Workshop on Computer Security Foundations","author":"M.Y. Becker","year":"2004","unstructured":"Becker, M.Y., Sewell, P.: Cassandra: Flexible Trust Management Applied to Electronic Health Records. In: Proceedings of the 17th IEEE Workshop on Computer Security Foundations, pp. 139\u2013154. IEEE Press, New York (2004)"},{"key":"11_CR28","unstructured":"R\u00f8stad, L.: Access control in healthcare information systems. PhD thesis, Norwegian University of Science and Technology (2008)"},{"key":"11_CR29","unstructured":"Hart, M., Johnson, R., Stent, A.: More Content - Less Control: Access Control in the Web 2.0. In: Proceedings of Web 2.0 Security and Privacy Workshop, W2SP 2007 (2007)"},{"key":"11_CR30","first-page":"153","volume-title":"Proceedings of the 2nd ACM Workshop on Role-Based Access Control","author":"L. Giuri","year":"1997","unstructured":"Giuri, L., Iglio, P.: Role templates for content-based access control. In: Proceedings of the 2nd ACM Workshop on Role-Based Access Control, pp. 153\u2013159. ACM, New York (1997)"},{"key":"11_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-642-29420-4_13","volume-title":"Formal Aspects of Security and Trust","author":"T.L. Hinrichs","year":"2012","unstructured":"Hinrichs, T.L., Garrison III, W.C., Lee, A.J., Saunders, S., Mitchell, J.C.: TBA: A Hybrid of Logic and Extensional Access Control Systems. In: Barthe, G., Datta, A., Etalle, S. (eds.) FAST 2011. LNCS, vol.\u00a07140, pp. 198\u2013213. Springer, Heidelberg (2012)"},{"key":"11_CR32","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/1232454.1232473","volume-title":"Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges","author":"S.K. Tzelepi","year":"2001","unstructured":"Tzelepi, S.K., Koukopoulos, D.K., Pangalos, G.: A flexible content and context-based access control model for multimedia medical image database systems. In: Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges, pp. 52\u201355. ACM, New York (2001)"},{"key":"11_CR33","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-642-15257-3_25","volume-title":"Security and Privacy \u2013 Silver Linings in the Cloud","author":"C. Kahl","year":"2010","unstructured":"Kahl, C., B\u00f6ttcher, K., Tschersich, M., Heim, S., Rannenberg, K.: How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) SEC 2010. IFIP AICT, vol.\u00a0330, pp. 277\u2013288. Springer, Heidelberg (2010)"},{"key":"11_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-10665-1_9","volume-title":"Cloud Computing","author":"S. Pearson","year":"2009","unstructured":"Pearson, S., Shen, Y., Mowbray, M.: A Privacy Manager for Cloud Computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol.\u00a05931, pp. 90\u2013106. Springer, Heidelberg (2009)"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Critical Infrastructures and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33332-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:09:27Z","timestamp":1744171767000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33332-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333316","9783642333323"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33332-3_11","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}