{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T07:58:59Z","timestamp":1726041539678},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030279271"},{"type":"electronic","value":"9783030279288"}],"license":[{"start":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T00:00:00Z","timestamp":1565740800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-27928-8_48","type":"book-chapter","created":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T01:02:59Z","timestamp":1565658179000},"page":"318-324","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Visualization When Using Mobile Applications for Dementia Scenarios"],"prefix":"10.1007","author":[{"given":"Joana","family":"Muchagata","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Vieira-Marques","sequence":"additional","affiliation":[]},{"given":"Soraia","family":"Teles","sequence":"additional","affiliation":[]},{"given":"Diogo","family":"Abrantes","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Ferreira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,14]]},"reference":[{"key":"48_CR1","unstructured":"Alzheimer\u2019s Disease International: The Global Impact of Dementia: An analysis of prevalence, incidence, cost and trends. World Alzheimer Report 2015 (2015)"},{"key":"48_CR2","unstructured":"Alzheimer\u2019s Association: Alzheimer\u2019s & Dementia - What Is Dementia? (2018)"},{"key":"48_CR3","unstructured":"Alzheimer\u2019s Disease Education and Referral Center: Alzheimer\u2019s Disease Fact Sheet. NIH Publication (2016)"},{"key":"48_CR4","first-page":"212","volume":"217","author":"T Oderud","year":"2015","unstructured":"Oderud, T., Landmark, B., Eriksen, S., Fossberg, A.B., Aketun, S., Omland, M., Hem, K.G., Ostensen, E., Ausen, D.: Persons with dementia and their caregivers using GPS. Stud. Health Technol. Inform. 217, 212\u2013221 (2015)","journal-title":"Stud. Health Technol. Inform."},{"issue":"1","key":"48_CR5","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1002\/gps.1643","volume":"22","author":"L. Robinson","year":"2006","unstructured":"Robinson, L., Hutchings, D., Dickinson, H., Corner, L., Beyer, F., Finch, T., Hughes, J., Vanoli, A., Ballard, C., Bond, J.: Effectiveness and acceptability of non-pharmacological interventions to reduce wandering in dementia: a systematic review. Int. J. Geriatr. Psychiatry: J. Psychiatry Late Life Allied Sci. 22(1), 9\u201322 (2007)","journal-title":"International Journal of Geriatric Psychiatry"},{"key":"48_CR6","unstructured":"Oderud, T., Landmark, B., Eriksen, S., Fossberg, A.B., Fossland Br\u00f8rs, K., Mandal, T.B., Ausen, D.: Exploring the use of GPS for locating persons with dementia. Assistive Technol. Res. Ser. 33, 776\u2013783 (2013)"},{"key":"48_CR7","doi-asserted-by":"crossref","unstructured":"Moura, P., Fazendeiro, P., Vieira-Marques, P., Ferreira, A.: SoTRAACE - socio-technical risk-adaptable access control model. In: 2017 International Carnahan Conference on Security Technology (ICCST), Madrid (2017)","DOI":"10.1109\/CCST.2017.8167835"},{"key":"48_CR8","unstructured":"What Is GPS SmartSole? A GPS Tracker, Hidden In An Insole, Tracked. \n                    http:\/\/gpssmartsole.com\/gpssmartsole"},{"key":"48_CR9","unstructured":"What Are the Top 10 Products to Best Track My Elderly Loved One\u2019s Location? \n                    https:\/\/www.caringvillage.com\/product-review\/top-10-products-track-elderly-location"},{"key":"48_CR10","doi-asserted-by":"crossref","unstructured":"Sposaro, F., Danielson, J., Tyson, G.: iWander: an Android application for dementia patients. In: 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology, pp. 3875\u20133878 (2010)","DOI":"10.1109\/IEMBS.2010.5627669"},{"key":"48_CR11","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, D.: NIST model for role-based access control: towards a unified standard (2000)","DOI":"10.1145\/344287.344301"},{"key":"48_CR12","doi-asserted-by":"crossref","unstructured":"Muchagata, J., Ferreira, A.: How can visualization affect security? In: ICEIS 2018 - 20th International Conference on Enterprise Information Systems. SCITEPRESS Digital Library, Poster Presentation in Funchal, Madeira - Portugal (2018)","DOI":"10.5220\/0006695505030510"},{"key":"48_CR13","doi-asserted-by":"crossref","unstructured":"Ferreira, A., Chadwick, D., Farinha, P., Correia, R., Zao, G., Chilro, R., Antunes, L.: How to securely break into RBAC: the BTG-RBAC model. In: 2009 Annual Computer Security Applications Conference, pp. 23\u201331 (2009)","DOI":"10.1109\/ACSAC.2009.12"},{"key":"48_CR14","doi-asserted-by":"crossref","unstructured":"Ferreira, A., Teles, S., Vieira-Marques, P.: SoTRAAce for smart security in ambient assisted living. J. Ambient Intell. Smart Environ. (2019)","DOI":"10.2196\/preprints.10119"}],"container-title":["Advances in Intelligent Systems and Computing","Human Systems Engineering and Design II"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27928-8_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T01:13:36Z","timestamp":1565658816000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-27928-8_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,14]]},"ISBN":["9783030279271","9783030279288"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27928-8_48","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,8,14]]},"assertion":[{"value":"14 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IHSED","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Systems Engineering and Design: Future Trends and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ihsed2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ihsed.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}