{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:04:54Z","timestamp":1740175494391,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s40860-019-00076-z","type":"journal-article","created":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T05:06:30Z","timestamp":1551416790000},"page":"91-103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cybersecurity design considerations for cross-boundary clinical decision support"],"prefix":"10.1007","volume":"5","author":[{"given":"Obinna","family":"Anya","sequence":"first","affiliation":[]},{"given":"Hissam","family":"Tawfik","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4324-1774","authenticated-orcid":false,"given":"Mohammed M.","family":"Alani","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,1]]},"reference":[{"key":"76_CR1","first-page":"65","volume-title":"Healthcare knowledge management: issues, advances and successes","author":"SSR Abidi","year":"2006","unstructured":"Abidi SSR (2006) Healthcare knowledge sharing: purpose, practices and prospects. In: Bali R, Dwivedi A (eds) Healthcare knowledge management: issues, advances and successes. Springer, New York, pp 65\u201386"},{"key":"76_CR2","unstructured":"Allert H, Richter C (2008) Practices, systems, and context working as core concepts in modeling socio-technical systems. In: Proceedings of of the 5th international workshop on philosophy and informatics, WSPI\u201908"},{"key":"76_CR3","unstructured":"Anya O (2012) Practice-centred e-health system design for cross-boundary clinical decision support. University of Liverpool"},{"key":"76_CR4","doi-asserted-by":"crossref","unstructured":"Anya O, Tawfik H, Amin S, Nagar A, Shaalan K (2010) Context-aware knowledge modelling for decision support in e-health. In: 2010 International joint conference on neural networks (IJCNN), pp 1\u20137","DOI":"10.1109\/IJCNN.2010.5596556"},{"key":"76_CR5","doi-asserted-by":"crossref","unstructured":"Anya O, Tawfik H, Naguib RNG (2018) Applying the practice theoretical perspective to healthcare knowledge management. In: Theories to inform superior health informatics research and practice, pp 375\u2013390","DOI":"10.1007\/978-3-319-72287-0_23"},{"issue":"2017","key":"76_CR6","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.compeleceng.2016.08.012","volume":"61","author":"O Anya","year":"2017","unstructured":"Anya O, Tawfik H (2017) Designing for practice-based context-awareness in ubiquitous e-health environments. J Comput Electr Eng 61(2017):312\u2013326","journal-title":"J Comput Electr Eng"},{"key":"76_CR7","doi-asserted-by":"crossref","unstructured":"Anya O, Tawfik H, Al-Jumeily D (2015) Context-aware clinical knowledge sharing in cross-boundary e-health: a conceptual model. In: 2015 IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.84"},{"issue":"4","key":"76_CR8","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1504\/IJIEM.2010.035624","volume":"6","author":"A Appari","year":"2010","unstructured":"Appari A, Eric Johnson M (2010) Information security and privacy in healthcare: current state of research. Int J Internet Enterp Manag 6(4):279\u2013314","journal-title":"Int J Internet Enterp Manag"},{"key":"76_CR9","doi-asserted-by":"crossref","unstructured":"Batra I, Luhach AK, Pathak N (2016) Research and analysis of lightweight cryptographic solutions for internet of things. In: Proceedings of the second international conference on information and communication technology for competitive strategies, no. 23","DOI":"10.1145\/2905055.2905229"},{"key":"76_CR10","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1006\/ijhc.1998.0229","volume":"49","author":"WJ Clancey","year":"1998","unstructured":"Clancey WJ, Sachs P, Sierhuis M, van Hoof R (1998) Brahms: simulating practice for work systems design. Int J Hum Comput Stud 49:831\u2013865","journal-title":"Int J Hum Comput Stud"},{"key":"76_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s40860-015-0001-7","volume":"1","author":"F Corno","year":"2015","unstructured":"Corno F, Guercio E, De Russis L, Gargiulo E (2015) Designing for user confidence in intelligent environments. J Reliab Intell Environ 1:11\u201321","journal-title":"J Reliab Intell Environ"},{"issue":"39","key":"76_CR12","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s40860-018-0054-5","volume":"4","author":"A Crabtree","year":"2018","unstructured":"Crabtree A, Lodge T, Colley J et al (2018) Building accountability into the Internet of Things: the IoT Databox model. J Reliab Intell Environ 4(39):39\u201355","journal-title":"J Reliab Intell Environ"},{"issue":"33","key":"76_CR13","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s40860-015-0002-6","volume":"1","author":"V Florio De","year":"2015","unstructured":"De Florio V (2015) On resilient behaviors in computational systems and environments. J Reliab Intell Environ 1(33):33\u201346","journal-title":"J Reliab Intell Environ"},{"issue":"141","key":"76_CR14","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s40860-018-0062-5","volume":"4","author":"PK Dhillon","year":"2018","unstructured":"Dhillon PK, Kalra S (2018) Multi-factor user authentication scheme for IoT-based healthcare services. J Reliab Intell Environ 4(141):141\u2013160","journal-title":"J Reliab Intell Environ"},{"issue":"6","key":"76_CR15","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-004-0308-5","volume":"8","author":"P Dourish","year":"2004","unstructured":"Dourish P, Grinter RE, Delgado De La Flor J, Joseph M (2004) Security in the wild: user strategies for managing security as an everyday, practical problem. Pers Ubiquitous Comput 8(6):391\u2013401","journal-title":"Pers Ubiquitous Comput"},{"issue":"1","key":"76_CR16","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00779-003-0253-8","volume":"8","author":"P Dourish","year":"2004","unstructured":"Dourish P (2004) What we talk about when we talk about context. Pers Ubiquitous Comput 8(1):19\u201330","journal-title":"Pers Ubiquitous Comput"},{"key":"76_CR17","doi-asserted-by":"crossref","unstructured":"Endsley MR, Bolstad CA, Jones DG, Riley JM (2003) Situation awareness oriented design: from user\u2019s cognitive requirements to creating effective supporting technologies. In: Human factors and ergonomics 47th annual meeting, Denver","DOI":"10.1037\/e577042012-004"},{"key":"76_CR18","volume-title":"Learning by expanding: an activity-theoretical approach to developmental work research","author":"Y Engestr\u00f6m","year":"1987","unstructured":"Engestr\u00f6m Y (1987) Learning by expanding: an activity-theoretical approach to developmental work research. Orienta-konsultit, Helsinki"},{"key":"76_CR19","volume-title":"Decision support for post-operative breast cancer care, coping with complexity: sharing new approaches for the design of human\u2013computer systems in complex settings","author":"DA England","year":"2004","unstructured":"England DA, Taleb-Bendiab A, Lisboa P, Murphy K, Jarman I (2004) Decision support for post-operative breast cancer care, coping with complexity: sharing new approaches for the design of human\u2013computer systems in complex settings. University of Bath, Bath"},{"key":"76_CR20","volume-title":"Practice-based evidence for healthcare: clinical mindlines","author":"J Gabbay","year":"2011","unstructured":"Gabbay J, Le May (2011) Practice-based evidence for healthcare: clinical mindlines. Routledge, London"},{"key":"76_CR21","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.websem.2011.11.007","volume":"12\u201313","author":"F Giunchiglia","year":"2012","unstructured":"Giunchiglia F, Maltese V, Dutta B (2012) Domains and context: first steps towards managing diversity in knowledge. J Web Semant 12\u201313:53\u201363","journal-title":"J Web Semant"},{"key":"76_CR22","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/1-84628-231-4_20","volume-title":"Intelligent decision-making support systems: foundations, applications and challenges","author":"N Karacapilidis","year":"2006","unstructured":"Karacapilidis N (2006) An overview of future challenges of decision support technologies. In: Gupta J, Forgionne G, Mora M (eds) Intelligent decision-making support systems: foundations, applications and challenges. Springer, London, pp 385\u2013399"},{"issue":"2\u20134","key":"76_CR23","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1207\/S15327051HCI16234_12","volume":"16","author":"D Kirsh","year":"2001","unstructured":"Kirsh D (2001) The context of work. Hum Comput Interact 16(2\u20134):305\u2013322","journal-title":"Hum Comput Interact"},{"volume-title":"Encyclopedia of e-Collaboration","year":"2008","key":"76_CR24","unstructured":"Kock N (ed) (2008) Encyclopedia of e-Collaboration. IGI Global Publishers, New York"},{"issue":"8","key":"76_CR25","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.ijmedinf.2011.01.009","volume":"80","author":"CE Kuziemsky","year":"2011","unstructured":"Kuziemsky CE, Varpio L (2011) A model of awareness to enhance our understanding of interprofessional collaborative care delivery and health information system design to support it. Int J Med Inform 80(8):150\u2013160","journal-title":"Int J Med Inform"},{"issue":"2","key":"76_CR26","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/JBHI.2015.2407157","volume":"20","author":"X Liu","year":"2016","unstructured":"Liu X, Lu R, Ma J, Chen L, Qin B (2016) Privacy-preserving patient-centric clinical decision support system on na\u00efve Bayesian classification. IEEE J Biomed Health Inf 20(2):655\u2013668","journal-title":"IEEE J Biomed Health Inf"},{"key":"76_CR27","doi-asserted-by":"crossref","unstructured":"Manadhata P, Wing JM (2004) Measuring a system\u2019s attack surface. Technical Report CMUCS-04-102. School of Computer Science, Carnegie Mellon University, Pittsburgh","DOI":"10.21236\/ADA458115"},{"key":"76_CR28","unstructured":"McCarthy J, Hayes PJ (1969) Some philosophical problems from the standpoint of artificial intelligence. In: Meltzer B, Michie D (eds) Machine intelligence, vol 4. Edinburgh University Press, pp 463\u2013502"},{"issue":"1","key":"76_CR29","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/TITB.2009.2033384","volume":"14","author":"DA Mejia","year":"2010","unstructured":"Mejia DA, Favela J, Mor\u00e1n AL (2010) Understanding and supporting lightweight communication in hospital work. IEEE Trans Inf Technol Biomed 14(1):140\u2013146","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"76_CR30","doi-asserted-by":"publisher","first-page":"2538","DOI":"10.1016\/j.ins.2009.01.033","volume":"179","author":"VT Nunes","year":"2009","unstructured":"Nunes VT, Santoro FM, Borges MRS (2009) A context-based model for knowledge management embodied in work processes. J Inf Sci 179:2538\u20132554","journal-title":"J Inf Sci"},{"key":"76_CR31","doi-asserted-by":"publisher","first-page":"831605","DOI":"10.4061\/2011\/831605","volume":"2011","author":"V Patkar","year":"2011","unstructured":"Patkar V, Acosta D, Davidson T, Jones A, Fox J, Keshtgar M (2011) Cancer multidisciplinary team meetings: evidence, challenges, and the role of clinical decision support technology. Int J Breast Cancer 2011:831605","journal-title":"Int J Breast Cancer"},{"key":"76_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17396-7","volume-title":"Contextual computing: models and applications","author":"R Porzel","year":"2011","unstructured":"Porzel R (2011) Contextual computing: models and applications. Springer, Berlin"},{"issue":"2","key":"76_CR33","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s40860-016-0019-5","volume":"2","author":"D Preuveneers","year":"2016","unstructured":"Preuveneers D, Joosen W (2016) Semantic analysis and verification of context-driven adaptive applications in intelligent environments. J Reliab Intell Environ 2(2):53\u201373","journal-title":"J Reliab Intell Environ"},{"key":"76_CR34","doi-asserted-by":"crossref","unstructured":"Resmini A, Rosati L (2011) Pervasive information architecture: designing cross-channel user experiences. Elsevier","DOI":"10.1109\/TPC.2011.2170911"},{"key":"76_CR35","volume-title":"Bridging the socio-technical gap in decision support systems: challenges for the next decade, Frontiers in Artificial Intelligence and Applications","author":"A Resp\u00edcio","year":"2010","unstructured":"Resp\u00edcio A, Adam F, Phillips-Wren G, Teixeira C, Telhada J (2010) Bridging the socio-technical gap in decision support systems: challenges for the next decade, Frontiers in Artificial Intelligence and Applications, vol 212. IOS Press, Amsterdam"},{"issue":"2","key":"76_CR36","first-page":"34","volume":"21","author":"P Sandell","year":"2007","unstructured":"Sandell P (2007) Framework for securing personal health data in clinical decision support systems. J Health Inf Manag Spring 21(2):34\u201340","journal-title":"J Health Inf Manag Spring"},{"issue":"4","key":"76_CR37","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TITB.2012.2187673","volume":"16","author":"H Tawfik","year":"2012","unstructured":"Tawfik H, Anya O, Nagar AK (2012) Understanding clinical work practices for cross-boundary decision support in e-health. IEEE Trans Inf Technol Biomed 16(4):530\u2013541","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"21","key":"76_CR38","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s40860-017-0038-x","volume":"3","author":"N Vithanwattana","year":"2017","unstructured":"Vithanwattana N, Mapp G, George C (2017) Developing a comprehensive information security framework for mHealth: a detailed analysis. J Reliab Intell Environ 3(21):21\u201339","journal-title":"J Reliab Intell Environ"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00076-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-019-00076-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00076-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T19:15:32Z","timestamp":1582917332000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-019-00076-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,1]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["76"],"URL":"https:\/\/doi.org\/10.1007\/s40860-019-00076-z","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"type":"print","value":"2199-4668"},{"type":"electronic","value":"2199-4676"}],"subject":[],"published":{"date-parts":[[2019,3,1]]},"assertion":[{"value":"30 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}