{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T16:44:30Z","timestamp":1732034670470},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596095","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:54:58Z","timestamp":1379606098000},"page":"377-380","source":"Crossref","is-referenced-by-count":9,"title":["Device Comfort for mobile health information accessibility"],"prefix":"10.1109","author":[{"given":"Stephen","family":"Marsh","sequence":"first","affiliation":[]},{"given":"Yao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Sylvie","family":"Noel","sequence":"additional","affiliation":[]},{"given":"Lewis","family":"Robart","sequence":"additional","affiliation":[]},{"given":"John","family":"Stewart","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Comfort zones: Location dependent trust and regret management for mobile devices","author":"marsh","year":"2010","journal-title":"Proceedings LocationTrust 2010 Workshop on Location As Context for Trust at IFIPTM 2010"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/570646.570647"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358699"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2007.014070"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2008.4525384"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/b137697","author":"istepanian","year":"2006","journal-title":"M-Health Emerging Mobile Health Systems"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29093-0_20"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/953460.953484"},{"journal-title":"A Survey of Context-Aware Mobile Computing Research","year":"2000","author":"chen","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29963-6_4"},{"journal-title":"Traces of Digital Trust An Interactive Design Perspective","year":"2011","author":"dwyer","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.19.231"},{"journal-title":"Of Codes Genomes and Electronic Health Records It's only Sensitive if It Hurts When You Touch It 2012","year":"2012","author":"masys","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WMCSA.1994.16"},{"journal-title":"Formalising trust as a computational concept","year":"1994","author":"marsh","key":"8"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2013,7,10]]},"location":"Tarragona, Spain","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596095.pdf?arnumber=6596095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,4]],"date-time":"2020-08-04T10:26:39Z","timestamp":1596536799000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6596095\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/pst.2013.6596095","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}