{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:22:38Z","timestamp":1730305358959,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/wimob.2019.8923532","type":"proceedings-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T07:28:23Z","timestamp":1575617303000},"page":"312-317","source":"Crossref","is-referenced-by-count":10,"title":["Privacy in the Future of Integrated Health Care Services \u2013 Are Privacy Languages the Key?"],"prefix":"10.1109","author":[{"given":"Armin","family":"Gerl","sequence":"first","affiliation":[]},{"given":"Bianca","family":"Meier","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2019","key":"ref32","article-title":"Privacy policy"},{"year":"2019","key":"ref31","article-title":"Privacy & terms"},{"year":"2019","key":"ref30","article-title":"Amazon privacy notice"},{"key":"ref10","article-title":"Layered privacy language (lpl) pseudonymization extension for health care","author":"gerl","year":"2019","journal-title":"Proceedings of MedInfo 2019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1136\/bmjopen-2015-010709"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.314.7093.1495"},{"key":"ref13","first-page":"20","article-title":"Integrated care processes designed for the future healthcare system","volume":"245","author":"b\u00fcrklea","year":"2018","journal-title":"MEDINFO 2017 Precision Healthcare Through Informatics Proceedings of the 16th World Congress on Medical and Health Informatics"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166794"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.101911.00087"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/10630732.2011.601117"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"article-title":"Web privacy with p3p","year":"2019","author":"cranor","key":"ref28"},{"year":"2015","key":"ref4","article-title":"Stimmen sie den aussagen voll \/ eher zu? datenschutzerklrungen&#x2026;"},{"key":"ref27","article-title":"Polisis: Automated analysis and presentation of privacy policies using deep learning","author":"harkous","year":"2018","journal-title":"&#x00C9;cole Polytechnique F&#x00E9;d&#x00E9;rale de Lausanne (EPFL)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.09.038"},{"article-title":"Guidelines on transparency under regulation 2016\/679 (wp260rev.01)","year":"2018","author":"party","key":"ref6"},{"article-title":"Pribots: Conversational privacy with chatbots","year":"2016","author":"harkous","key":"ref29"},{"article-title":"How cios can prepare for healthcare data tsunami","year":"2014","author":"corbin","key":"ref5"},{"key":"ref8","article-title":"Policy-based authentication and authorization based on the layered privacy language","author":"wilhelm","year":"2019","journal-title":"Datenbanksysteme f&#x00FC;r Business Technologie und Web (BTW 2017)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2018.177"},{"key":"ref2","article-title":"The cost of reading privacy policies","volume":"4","author":"mcdonald","year":"2008","journal-title":"I\/S A Journal of law and Policy for the Information Society"},{"key":"ref9","first-page":"1","author":"gerl","year":"2018","journal-title":"LPL Towards a GDPR-Compliant Privacy Language Formal Definition and Usage"},{"journal-title":"2016 of the European Parliament and of the Council of on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC","article-title":"General data protection regulation","year":"2016","key":"ref1"},{"article-title":"Amazons vision for the future of health care is becoming clear","year":"2018","author":"farr","key":"ref20"},{"key":"ref22","article-title":"Let users control their data -privacy policy-based user interface design","author":"gerl","year":"2019","journal-title":"Human Interaction and Emerging Technologies 2019 - Proceedings of the 1st International Conference on Human Interaction and Emerging Technologies (IHIET 2019) conference"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3233267"},{"key":"ref24","first-page":"108","article-title":"Towards usable privacy policy display & management-the primelife approach","author":"angulo","year":"0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644528"},{"key":"ref26","article-title":"Deliverable d2.1 - policy language v1","author":"bonatti","year":"2017","journal-title":"Scalable Policy-aware Linked Data Architecture For Privacy"},{"key":"ref25","first-page":"261","author":"angulo","year":"2011","journal-title":"HCI for Policy Display and Administration"}],"event":{"name":"2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2019,10,21]]},"location":"Barcelona, Spain","end":{"date-parts":[[2019,10,23]]}},"container-title":["2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8913409\/8923119\/08923532.pdf?arnumber=8923532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:55:40Z","timestamp":1658094940000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8923532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/wimob.2019.8923532","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}