{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T21:59:35Z","timestamp":1759960775664,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,3]],"date-time":"2010-05-03T00:00:00Z","timestamp":1272844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5,3]]},"DOI":"10.1145\/1809085.1809091","type":"proceedings-article","created":{"date-parts":[[2010,6,11]],"date-time":"2010-06-11T18:52:58Z","timestamp":1276282378000},"page":"39-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Social networking applications in health care"],"prefix":"10.1145","author":[{"given":"James","family":"Williams","sequence":"first","affiliation":[{"name":"University of Victoria, Victoria, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2010,5,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/76894.76895"},{"volume-title":"Information Outlook","year":"2005","author":"Abram S.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572535"},{"key":"e_1_3_2_1_4_1","first-page":"38","article-title":"Health 2.0: Do it yourself doctoring","volume":"2008","author":"Bleicher P.","year":"2008","journal-title":"Applied Clinical Trials"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2007.4400987"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Cormode G. and Krishnamurthy B. 2008. Key differences between web 1.0 and web 2.0. First Monday 13(6) June 2008.  Cormode G. and Krishnamurthy B. 2008. Key differences between web 1.0 and web 2.0. First Monday 13(6) June 2008.","DOI":"10.5210\/fm.v13i6.2125"},{"volume-title":"Proceedings of the 34th international Conference on Very Large Databases (VLDB'08)","year":"2008","author":"Cormode G.","key":"e_1_3_2_1_8_1"},{"volume-title":"The University of North Carolina Press","year":"1989","author":"Flaherty D.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Felt A. and Evans D. 2008. Privacy protection for social networking APIs. 2008.  Felt A. and Evans D. 2008. Privacy protection for social networking APIs. 2008."},{"volume-title":"Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP '07)","year":"2007","author":"Gollu K. K.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397747"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1665997.1666002"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578007"},{"key":"e_1_3_2_1_16_1","first-page":"2","volume-title":"Health Information and Libraries Journal","author":"Kamel Boulos M. N.","year":"2007"},{"key":"e_1_3_2_1_17_1","unstructured":"Kienle H. M. Lober A. and Muller H. A. Policy and Legal Challenges of Virtual Worlds and Social Network Sites.  Kienle H. M. Lober A. and Muller H. A. Policy and Legal Challenges of Virtual Worlds and Social Network Sites."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592668"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397744"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526782"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456405"},{"volume-title":"EMBS Conference, IEEE","author":"Moturu S. T.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646333"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1097\/01.NAJ.0000287504.92887.de"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518754"},{"volume-title":"Proceedings of the 12th Cambridge Intl. Workshop on Security Protocols","year":"2004","author":"Popescu B. C.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i1.2775"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.75"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers Xxii: Culture, Creativity, interaction -","volume":"1","author":"Strater K.","year":"2008"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556500"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654988.1654992"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"e_1_3_2_1_34_1","unstructured":"Westin A. Privacy and Freedom Atheneum NY 1967.  Westin A. Privacy and Freedom Atheneum NY 1967."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556499"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2009.77"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1540276.1540279"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.387"}],"event":{"name":"ICSE '10: 32nd International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Cape Town South Africa","acronym":"ICSE '10"},"container-title":["Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1809085.1809091","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1809085.1809091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:23:03Z","timestamp":1750245783000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1809085.1809091"}},"subtitle":["threats to the privacy and security of health information"],"short-title":[],"issued":{"date-parts":[[2010,5,3]]},"references-count":38,"alternative-id":["10.1145\/1809085.1809091","10.1145\/1809085"],"URL":"https:\/\/doi.org\/10.1145\/1809085.1809091","relation":{},"subject":[],"published":{"date-parts":[[2010,5,3]]},"assertion":[{"value":"2010-05-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}