{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:01:40Z","timestamp":1729638100313,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/icc.2012.6364974","type":"proceedings-article","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T00:17:44Z","timestamp":1354580264000},"page":"6111-6115","source":"Crossref","is-referenced-by-count":3,"title":["Creating intelligent environments to monitor and manipulate physical activity and sedentary behavior in public health and clinical settings"],"prefix":"10.1109","author":[{"given":"G.","family":"Stratton","sequence":"first","affiliation":[]},{"given":"R.","family":"Murphy","sequence":"additional","affiliation":[]},{"given":"M.","family":"Rosenberg","sequence":"additional","affiliation":[]},{"given":"P.","family":"Fergus","sequence":"additional","affiliation":[]},{"given":"A.","family":"Attwood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1108\/00242530810865538","article-title":"Ethics and technology: Ethical issues in an age of information and communication technology","volume":"57","author":"hannabus","year":"2008","journal-title":"Library Review"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1177\/1468794109105032"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/WIAD.2010.5544941"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1037\/a0025139"},{"key":"18","article-title":"TechMatters: Dropbox: Storing and sharing information in the cloud","volume":"37","author":"graham","year":"2011","journal-title":"LEOX Quarterly"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.PERVASIVEHEALTH2009.6033"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.31"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1049\/cp:20081145"},{"key":"14","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1123\/jpah.8.5.613","article-title":"Individual, social, and physical environment factors associated with electronic media use among children: Sedentary behavior at home","volume":"8","author":"granich","year":"2011","journal-title":"Journal of Physical Activity and Health"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsams.2010.01.005"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsams.2008.09.015"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/UBICOMM.2008.51"},{"journal-title":"HSE Physical Activity and Fitness","year":"2008","author":"craig","key":"3"},{"key":"20","first-page":"119","article-title":"Location-sharing technologies: Privacy risks and controls","volume":"6","author":"tsai","year":"2010","journal-title":"I\/S - A Journal of Law and Policy for the Information Society"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1001\/jama.1996.03540030039029"},{"key":"1","first-page":"126","article-title":"Physical activity, exercise, and physical fitness: Definitions and distinctions for health-related research","volume":"100","author":"caspersen","year":"1985","journal-title":"Public Health Reports Washington DC 1974"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2006.11.046"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1038\/oby.2010.302"},{"key":"6","article-title":"The impact of technology on sport-new frontiers","volume":"1","author":"fuzz","year":"2008","journal-title":"Sports Technology"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1097\/JSM.0b013e3181c12e3c"},{"journal-title":"Evaluating Sport and Physical Activity Interventions A Guide for Practitioners","year":"2007","author":"dugdill","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0900282106"},{"key":"8","article-title":"Monitoring and measuring sedentary behaviour with the aid ofhuman digital memories","author":"dobbins","year":"2012","journal-title":"IEEE CCNC"}],"event":{"name":"ICC 2012 - 2012 IEEE International Conference on Communications","start":{"date-parts":[[2012,6,10]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2012,6,15]]}},"container-title":["2012 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6350935\/6363631\/06364974.pdf?arnumber=6364974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T23:50:56Z","timestamp":1643759456000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6364974\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icc.2012.6364974","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}