{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:04:44Z","timestamp":1740096284295,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642405105"},{"type":"electronic","value":"9783642405112"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40511-2_1","type":"book-chapter","created":{"date-parts":[[2013,8,19]],"date-time":"2013-08-19T01:53:28Z","timestamp":1376877208000},"page":"1-15","source":"Crossref","is-referenced-by-count":0,"title":["Sensor Data Meets Social Networks Reflecting on Benefits in the Case of a Patient Room"],"prefix":"10.1007","author":[{"given":"Fabienne","family":"Kuhn","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Spichiger","sequence":"additional","affiliation":[]},{"given":"Reinhard","family":"Riedl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1145\/2245276.2245351","volume-title":"SAC 2012","author":"S. Chun","year":"2012","unstructured":"Chun, S., MacKellar, B.: Social Health Data Integration using Semantic Web. In: SAC 2012, Riva del Garda, Italy, March 25-29, pp. 392\u2013397. ACM, New York (2012), http:\/\/dx.doi.org\/10.1145\/2245276.2245351"},{"key":"1_CR2","unstructured":"Bry, F., et al.: Digital Social Media, Dagstuhl Manifesto. University of Munich, Germany (2010), http:\/\/www.pms.ifi.lmu.de\/publikationen\/PMS-FB\/PMS-FB-2010-7\/PMS-FB-2010-7-dagstuhl-manifesto.pdf"},{"issue":"4","key":"1_CR3","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/s00779-010-0357-x","volume":"15","author":"R. Vera","year":"2011","unstructured":"Vera, R., Ochoa, S.F., Aldunate, R.G.: EDIPS: An Easy to Deploy Indoor Positioning System to support loosely coupled mobile work. Personal and Ubiquitous Computing\u00a015(4), 365\u2013374 (2011), http:\/\/dx.doi.org\/10.1007\/s00779-010-0357-x","journal-title":"Personal and Ubiquitous Computing"},{"key":"1_CR4","first-page":"35","volume-title":"ICMI 2007","author":"K. Kamei","year":"2007","unstructured":"Kamei, K., et al.: Tagging Strategies for Extracting Real-world Events with Networked Sensors. In: ICMI 2007, Nagoya, Japan, November 15, pp. 35\u201342. ACM, New York (2007), http:\/\/dx.doi.org\/10.1145\/1330588.1330594"},{"issue":"66","key":"1_CR5","first-page":"68","volume":"155","author":"T. Sawyer","year":"2012","unstructured":"Sawyer, T.: Facebook Timeline. Rough Notes\u00a0155(66), 68\u201369 (2012), http:\/\/search.proquest.com\/docview\/1010360195?accountid=15920","journal-title":"Rough Notes"},{"key":"1_CR6","volume-title":"Distributed Systems","author":"S. Mullender","year":"1993","unstructured":"Mullender, S.: Distributed Systems. ACM Press, United States of America (1993)"},{"key":"1_CR7","volume-title":"Messger\u00e4te-Praxis, Funktion und Einsatz moderner Messger\u00e4te","author":"M. Bantel","year":"2004","unstructured":"Bantel, M.: Messger\u00e4te-Praxis, Funktion und Einsatz moderner Messger\u00e4te. Hanser Verlag, M\u00fcnchen Wien (2004)"},{"key":"1_CR8","doi-asserted-by":"publisher","DOI":"10.1002\/9780470666388","volume-title":"Fundamentals of wireless sensor networks: theory and practice","author":"W. Dargie","year":"2010","unstructured":"Dargie, W., Poellabauer, C.: Fundamentals of wireless sensor networks: theory and practice. John Wiley and Sons, Hoboken (2010)"},{"key":"1_CR9","unstructured":"Swedberg, C.: Michigan Researchers Develop RFID-based Sensors to Measure Physical Activity. RFID Journal (2010), http:\/\/www.rfidjournal.com\/article\/view\/7884\/"},{"key":"1_CR10","unstructured":"EHR Scope: Hospital Information Systems (HIS) (2013), http:\/\/www.emrconsultant.com\/education\/hospital-information-systems"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Luo, W., Liu, J., Liu, J.: An Analysis of Security in Social Networks. In: DASC 2009, Chongqing, China, December 12-14, pp. 648\u2013651 (2009), http:\/\/dx.doi.org\/10.1109\/DASC.2009.100","DOI":"10.1109\/DASC.2009.100"},{"key":"1_CR12","unstructured":"Watson, L.: Woman dies after replacement nurse gives her wrong drug during labout dispute. Daily Mail, September 26 (2011), http:\/\/www.dailymail.co.uk\/news\/article-2041884\/Woman-dies-replacement-nurse-gives-wrong-drug-labour-dispute.html#axzz2KcPIH9Of"},{"key":"1_CR13","first-page":"41","volume-title":"ICEC 2012","author":"C.C. Yang","year":"2012","unstructured":"Yang, C.C., et al.: Identifying Implicit Relationships between Social Media Users to Support Social Commerce. In: ICEC 2012, Singapore, Singapore, August 07-08, pp. 41\u201347. ACM, New York (2012), http:\/\/dx.doi.org\/10.1145\/2346536.2346544"},{"key":"1_CR14","unstructured":"Sharp, J.: A Look at Social Media in Health Care \u2013 Two Years Later. iHealthBeat, May 17 (2012), http:\/\/www.ihealthbeat.org\/perspectives\/2012\/a-look-at-social-media-in-health-care-two-years-later.aspx"},{"key":"1_CR15","first-page":"289","volume-title":"WWW 2011","author":"M. Nagarajan","year":"2011","unstructured":"Nagarajan, M., Sheth, A., Velmurugan, S.: Citizen sensor data mining, social media analytics and development centric web applications. In: WWW 2011, Hyderabad, India, March 28-April 1, pp. 289\u2013290. ACM, New York (2011), http:\/\/dx.doi.org\/10.1145\/1963192.1963315"},{"issue":"10","key":"1_CR16","doi-asserted-by":"publisher","first-page":"2812","DOI":"10.1109\/JPROC.2012.2195629","volume":"100","author":"O. Aulov","year":"2012","unstructured":"Aulov, O., Halem, M.: Human Sensor Networks for Improved Modeling of Natural Disasters. IEEE\u00a0100(10), 2812\u20132823 (2012), http:\/\/dx.doi.org\/10.1109\/JPROC.2012.2195629","journal-title":"IEEE"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Della Mea, V.: What is e-Health (2): The death of telemedicine? J. Med. Internet Res.\u00a03(2), e22 (2001), http:\/\/dx.doi.org\/10.2196\/jmir.3.2.e22","DOI":"10.2196\/jmir.3.2.e22"},{"key":"1_CR18","unstructured":"Bos, L., et al.: Patient 2.0 Empowerment. In: SWWS 2008, pp. 164\u2013167 (2008), http:\/\/science.icmcc.org\/2008\/07\/24\/patient-20-empowerment"},{"key":"1_CR19","volume-title":"PETRA 2008","author":"E. Becker","year":"2008","unstructured":"Becker, E., et al.: A wireless sensor network architecture and its application in an assistive environment. In: PETRA 2008, Athens, Greece, July 15-19, Article No. 25. ACM, New York (2008), http:\/\/dx.doi.org\/10.1145\/1389586.1389616"},{"key":"1_CR20","unstructured":"Loughran, M.: IBM, Public Health Groups Form Global Pandemic Initiative, Goal is to Identify, Map Pandemic Outbreaks and Better Target Vaccines. IBM News (May 2006), http:\/\/www-03.ibm.com\/press\/us\/en\/pressrelease\/19640.wss"},{"key":"1_CR21","unstructured":"Rost-Hein, M., Japs, S.: RFID im Gesundheitswesen, Die Anwendungsbereiche. Informationsforum RFID e.V. (2007), http:\/\/www.info-rfid.de\/info-rfid\/content\/e107\/e127\/e242\/rfid_im_gesundheitswesen_ger.pdf"},{"key":"1_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12578-2","volume-title":"Requirements Engineering. Fundamentals, Principles, and Techniques","author":"K. Pohl","year":"2010","unstructured":"Pohl, K.: Requirements Engineering. Fundamentals, Principles, and Techniques. Springer, London (2010)"},{"issue":"1","key":"1_CR23","doi-asserted-by":"crossref","first-page":"43","DOI":"10.4067\/S0718-18762011000100005","volume":"6","author":"A. Kuehn","year":"2011","unstructured":"Kuehn, A., et al.: Interoperability and Information Brokers in Public Safety: An Approach toward Seamless Emergency Communications. Journal of Theoretical and Applied Electronic Commerce Research\u00a06(1), 43\u201360 (2011), http:\/\/dx.doi.org\/10.4067\/S0718-18762011000100005","journal-title":"Journal of Theoretical and Applied Electronic Commerce Research"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey. Computer Networks 54(15) 2787-2805 (October 2010), http:\/\/dx.doi.org\/10.1016\/j.comnet.2010.05.010","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Wilson, A.D.: Human-Computer Interaction Handbook, Fundamentals, Evolving Technologies and Emerging Applications, pp. 177\u2013199. CRC Press (2007), http:\/\/dx.doi.org\/10.1201\/b11963-10","DOI":"10.1201\/b11963-10"},{"key":"1_CR26","first-page":"21","volume-title":"SPIMACS 2010","author":"G. Noordende Van","year":"2010","unstructured":"Van Noordende, G.: Security in the Dutch Electronic Patient Record System. In: SPIMACS 2010, pp. 21\u201332. ACM, New York (2010), http:\/\/dx.doi.org\/10.1145\/1866914.1866918"},{"issue":"1","key":"1_CR27","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s00779-007-0172-1","volume":"13","author":"J. Neumann","year":"2009","unstructured":"Neumann, J., et al.: Integration of audiovisual sensors and technologies in a smart room. Personal and Ubiquitous Computing\u00a013(1), 15\u201323 (2009), http:\/\/dx.doi.org\/10.1007\/s00779-007-0172-1","journal-title":"Personal and Ubiquitous Computing"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Aijaz, F., Chaudhary, A., Walke, B.: Mobile Web Services in Health Care and Sensor Networks. In: ICCSN 2010, pp. 254\u2013259 (2010), http:\/\/dx.doi.org\/10.1109\/ICCSN.2010.42","DOI":"10.1109\/ICCSN.2010.42"},{"key":"1_CR29","unstructured":"deBrankart, D.: Swiss ePatient Day \u2013 Opening Speech (2011), http:\/\/my.brainshark.com\/Swiss-ePatient-Day-Opening-Speech-122780377"},{"key":"1_CR30","unstructured":"Wojciechowski, M.: Distributing and Replicating Data in Hospital Information Systems, http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.80.4695&rep=rep1&type=pdf"},{"key":"1_CR31","unstructured":"Burkhard, S., Schorre, S.: Ich wei\u00df was du letzten Sommer gelesen hast - E-Reader und die Implikationen f\u00fcr den Datenschutz. In: Schweighofer, E., Kummer, F. (eds.) Europ\u00e4ische Projektkultur als Beitrag zur Rationalisierung des Rechts(\u00d6sterreichische Computer Gesellschaft), IRIS 2011, pp. 35\u201344 (2011)"},{"issue":"1","key":"1_CR32","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"Hevner","year":"2004","unstructured":"Hevner, et al.: Design Science in Information Systems Research. MIS Quarterly\u00a028(1), 75\u2013105 (2004), em.wtu.edu.cn\/mis\/jxkz\/sjkx.pdf","journal-title":"MIS Quarterly"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Marion, J.B.: Hospital information systems: perspectives on problems and prospects, 1979 and 2002. International Journal of Medical Informatics\u00a069(2-3) (2002), http:\/\/dx.doi.org\/10.1016\/S1386-5056(02)00098-9","DOI":"10.1016\/S1386-5056(02)00098-9"},{"key":"1_CR34","unstructured":"Denzler, L.: Das Arzt-Patienten-Verh\u00e4ltnis im digitalen Zeitalter. Unsere Gesundheitsdaten im Netz, eHealth Publifocus und Elektronisches Patientendossier TA-P10\/2008 p. 12 (2008)"},{"key":"1_CR35","unstructured":"Bosshard, G., et al.: Rechtliche Grundlagen im medizinischen Alltag, Ein Leitfaden f\u00fcr die Praxis. SAMW und FMH, Switzerland, pp. 80 (2008)"},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Breslin, J.G.: Integrating Social Networks and Sensor Networks. In: W3C Workshop on the Future of Social Networking (2009)","DOI":"10.1007\/978-3-642-01172-6_10"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Stelle, R.: Social Media, Mobile Devices and Sensors: Categorizing New Techniques for Health Communication. In: ICST Fifth International Conference on Sensing Technology, pp. 187\u2013192 (2011), http:\/\/dx.doi.org\/10.1109\/ICSensT.2011.6136960","DOI":"10.1109\/ICSensT.2011.6136960"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Ash, J.S., Berg, M., Coiera, E.: Some Unintended Consequences of Information Technology in Health Care: The Nature of Patient Care Information System-related Errors. J. Am. Med. Inform. Assoc., pp. 104\u2013112, http:\/\/dx.doi.org\/10.1197\/jamia.M1471","DOI":"10.1197\/jamia.M1471"},{"issue":"7237","key":"1_CR39","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1136\/bmj.320.7237.788","volume":"320","author":"D.W. Bates","year":"2000","unstructured":"Bates, D.W.: Using information technology to reduce rates of medication errors in hospitals. BMJ\u00a0320(7237), 788\u2013791 (2000)","journal-title":"BMJ"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems and HCI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40511-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T22:57:59Z","timestamp":1688425079000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40511-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405105","9783642405112"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40511-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}