{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:44:35Z","timestamp":1730202275994,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/cbms.2013.6627780","type":"proceedings-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T17:49:25Z","timestamp":1382032165000},"page":"149-154","source":"Crossref","is-referenced-by-count":2,"title":["An extended conceptual model of consent for information systems"],"prefix":"10.1109","author":[{"given":"Christian J.","family":"Bonnici","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"25","article-title":"A history of consent in western thought","author":"johnston","year":"2010","journal-title":"The Ethics of Consent Theory and Practice Chapter 10"},{"key":"17","first-page":"49","article-title":"Building a conceptual framework: Philosophy, definitions, and procedure","volume":"8","author":"jabareen","year":"2009","journal-title":"International Journal for Quality Research"},{"key":"18","first-page":"347","article-title":"Consent to medical care: The importance of fiduciary context","author":"joffe","year":"2010","journal-title":"The Ethics of Consent Theory and Practice Chapter 10"},{"key":"15","first-page":"503","article-title":"Informed consent by design","volume":"24","author":"friedman","year":"2005","journal-title":"Security and Usability Designing Secure Systems that People Can Use"},{"key":"16","first-page":"189","article-title":"The colour of e-consent","volume":"1","author":"gautrais","year":"2003","journal-title":"University of Ottawa Law &Technology Journal"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/9780470281819.ch4"},{"key":"14","first-page":"1177","author":"friedman","year":"2002","journal-title":"The Human-Computer Interaction Handbook Fundamentals Evolving Technologies and Emerging Applications (Human Factors and Ergonomics) Chapter 61"},{"journal-title":"Informed Consent Online A Conceptual Model and Design Principles","year":"2000","author":"friedman","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994366"},{"key":"21","first-page":"3","article-title":"The nature of consent","author":"kleinig","year":"2010","journal-title":"The Ethics of Consent Theory and Practice Chapter 10"},{"journal-title":"The Silent World of Doctor and Patient","year":"1984","author":"katz","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370310"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814600"},{"key":"24","first-page":"79","article-title":"Preface to a theory of consent transactions: Beyond valid consent","author":"miller","year":"2010","journal-title":"The Ethics of Consent Theory and Practice Chapter 10"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/eTELEMED.2010.27"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.2307\/797066"},{"year":"0","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511610011"},{"journal-title":"Informed Consent Legal Theory and Clinical Practice","year":"2001","author":"berg","key":"3"},{"journal-title":"The Principle of Beneficence in Applied Ethics","year":"2008","author":"beauchamp","key":"2"},{"journal-title":"Human Values and the Design of Computer Technology Number 72 in CSLI Lecture Notes","year":"1997","author":"friedman","key":"10"},{"year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199231461.003.0006"},{"key":"6","first-page":"161","article-title":"A decentralised approach to electronic consent and health information access control","volume":"37","author":"o'keefe","year":"2005","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"5","first-page":"251","author":"bix","year":"2010","journal-title":"The Ethics of Consent Theory and Practice Chapter 10"},{"journal-title":"Consent in the Law Legal Theory Today","year":"2007","author":"beyleveld","key":"4"},{"journal-title":"Informed Consent in Information Technology Improving User Experience","year":"2009","author":"flick","key":"9"},{"journal-title":"A History and Theory of Informed Consent","year":"1986","author":"faden","key":"8"}],"event":{"name":"2013 IEEE 26th International Symposium on Computer-Based Medical Systems (CBMS)","start":{"date-parts":[[2013,6,20]]},"location":"Porto, Portugal","end":{"date-parts":[[2013,6,22]]}},"container-title":["Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6607262\/6627745\/06627780.pdf?arnumber=6627780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T16:42:14Z","timestamp":1490200934000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6627780\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cbms.2013.6627780","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}