{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:14:02Z","timestamp":1729642442521,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/percomw.2014.6815234","type":"proceedings-article","created":{"date-parts":[[2014,5,16]],"date-time":"2014-05-16T19:05:08Z","timestamp":1400267108000},"page":"370-375","source":"Crossref","is-referenced-by-count":0,"title":["Social networks and ubiquitous monitoring: An application of the PSA-BI model"],"prefix":"10.1109","author":[{"given":"Stuart","family":"Moran","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1002\/job.157","article-title":"Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems","volume":"23","author":"zweig","year":"2002","journal-title":"Journal of Organizational Behavior"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1080\/03637759609376396"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1162\/dram.2008.52.4.21"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1177\/003232928701500404"},{"journal-title":"the Age of the Smart Machine The Future of Work and Power","year":"1988","author":"zuboff","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-456-9.ch007"},{"journal-title":"Discipline and Punish The Birth of the Prison Harmondsworth","year":"1977","author":"foucault","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2011.112"},{"journal-title":"The Panopticon Writings","year":"1995","author":"bentham","key":"12"},{"key":"21","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view","volume":"27","author":"venkatesh","year":"2003","journal-title":"MIS Quarterly"},{"key":"20","first-page":"298","article-title":"User perceptions of system attributes in ubiquitous monitoring: Toward a model of Behavioural Intention","author":"moran","year":"2011","journal-title":"School of Construction Management and Engineering and Informatics Research Centre Reading University of Reading"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"journal-title":"User Control in Ubiquitous Computing Design Alternatives and User Acceptance Shaker Aachen","year":"2008","author":"spiekermann","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.1316826"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012456832336"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409661"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2012.6199845"},{"key":"2","first-page":"132","article-title":"Living in a smart environment-implications for the coming ubiquitous information Society","volume":"15","author":"langheinrich","year":"2005","journal-title":"Telecommunications Review"},{"key":"1","first-page":"201","author":"chiang","year":"0","journal-title":"Birds on Paper An Alternative Interface to Compose Music by Utilizing Sketch Drawing and Mobile Device"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/abc.20083"},{"key":"6","article-title":"A framework for evaluation of ubicomp applications","author":"theofanos","year":"2005","journal-title":"First International Workshop on Social Implications of Ubiquitous Computing"},{"key":"5","article-title":"Examining electronic surveillance in the workplace: A review of theoretical perspectives and research findings","author":"vorvoreanu","year":"2000","journal-title":"The Conference of the International Communication Association Acapulco Mexico"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.3763\/inbi.2009.0040"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2141622.2141638"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.4278\/ajhp.100107-QUAN-2"}],"event":{"name":"2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)","start":{"date-parts":[[2014,3,24]]},"location":"Budapest, Hungary","end":{"date-parts":[[2014,3,28]]}},"container-title":["2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6805350\/6815123\/06815234.pdf?arnumber=6815234","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T11:09:29Z","timestamp":1565435369000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6815234\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/percomw.2014.6815234","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}