{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:11:38Z","timestamp":1725538298474},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642049408"},{"type":"electronic","value":"9783642049415"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04941-5_8","type":"book-chapter","created":{"date-parts":[[2009,9,18]],"date-time":"2009-09-18T13:53:38Z","timestamp":1253282018000},"page":"63-72","source":"Crossref","is-referenced-by-count":3,"title":["Towards Health 2.0: Mashups to the Rescue"],"prefix":"10.1007","author":[{"given":"Ohad","family":"Greenshpan","sequence":"first","affiliation":[]},{"given":"Ksenya","family":"Kveler","sequence":"additional","affiliation":[]},{"given":"Boaz","family":"Carmeli","sequence":"additional","affiliation":[]},{"given":"Haim","family":"Nelken","sequence":"additional","affiliation":[]},{"given":"Pnina","family":"Vortman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7105.001.0001","volume-title":"The Virtual Community: Homesteading on the Electronic Frontier, revised edition","author":"H. Rheingold","year":"2000","unstructured":"Rheingold, H.: The Virtual Community: Homesteading on the Electronic Frontier, revised edition. The MIT Press, Cambridge (2000)"},{"key":"8_CR2","unstructured":"Health 2.0 conference, http:\/\/www.health2con.com\/"},{"issue":"2","key":"8_CR3","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.jbi.2004.04.001","volume":"37","author":"W. Pratt","year":"2004","unstructured":"Pratt, W., et al.: Incorporating ideas from computer-supported cooperative work. J. of Biomedical Informatics\u00a037(2), 128\u2013137 (2004)","journal-title":"J. of Biomedical Informatics"},{"issue":"2","key":"8_CR4","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1197\/jamia.M2025","volume":"13","author":"P. Tang","year":"2006","unstructured":"Tang, P., et al.: Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption. J. Am. Med. Inform. Assoc.\u00a013(2), 121\u2013126 (2006)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"8_CR5","unstructured":"Anderson, C.: Wired 12.10: The long tail"},{"issue":"1","key":"8_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/S1386-5056(00)00134-9","volume":"61","author":"D. Sittig","year":"2001","unstructured":"Sittig, D., King, S., BL, H.: A survey of patient-provider e-mail communication: what do patients think? Int. J. Med. Inform.\u00a061(1), 71\u201380 (2001)","journal-title":"Int. J. Med. Inform."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Angst, C.M., Agarwal, R.: Patients Take Control: Individual Empowerment with Personal Health Records. SSRN eLibrary (2004)","DOI":"10.2139\/ssrn.904622"},{"key":"8_CR8","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1145\/1031607.1031642","volume-title":"CSCW","author":"G. Beenen","year":"2004","unstructured":"Beenen, G., et al.: Using social psychology to motivate contributions to online communities. In: CSCW, pp. 212\u2013221. ACM, New York (2004)"},{"issue":"2","key":"8_CR9","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1177\/1460458203009002004","volume":"9","author":"K. Eriksson-Backa","year":"2003","unstructured":"Eriksson-Backa, K.: Who uses the web as a health information source? Health Informatics J.\u00a09(2), 93\u2013101 (2003)","journal-title":"Health Informatics J."},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1080\/01421590701881673","volume":"30","author":"J.B. McGee","year":"2008","unstructured":"McGee, J.B., Begg, M.: What medical educators need to know about \u201dweb 2.0\u201d. Medical teacher\u00a030(2), 164\u2013169 (2008)","journal-title":"Medical teacher"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/1458502.1458517","volume-title":"WIDM","author":"S. Abiteboul","year":"2008","unstructured":"Abiteboul, S., Greenshpan, O., Milo, T.: Modeling the mashup space. In: Chan, C.Y., Polyzotis, N. (eds.) WIDM, pp. 87\u201394. ACM, New York (2008)"},{"key":"8_CR12","unstructured":"Programmableweb, http:\/\/www.programmable.com\/"},{"key":"8_CR13","first-page":"3","volume-title":"VLDB","author":"A. Jhingran","year":"2006","unstructured":"Jhingran, A.: Enterprise information mashups: Integrating information, simply. In: VLDB, pp. 3\u20134. ACM, New York (2006)"},{"issue":"3","key":"8_CR14","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MIC.2007.74","volume":"11","author":"F. Daniel","year":"2007","unstructured":"Daniel, F., et al.: Understanding ui integration: A survey of problems, technologies, and opportunities. IEEE Internet Computing\u00a011(3), 59\u201366 (2007)","journal-title":"IEEE Internet Computing"},{"key":"8_CR15","first-page":"19","volume":"28","author":"A. Cho","year":"2007","unstructured":"Cho, A.: An introduction to mashups for health librarians. JCHLA\/JABSC\u00a028, 19\u201322 (2007)","journal-title":"JCHLA\/JABSC"},{"issue":"11","key":"8_CR16","doi-asserted-by":"publisher","first-page":"2955","DOI":"10.1093\/humrep\/del214","volume":"21","author":"W. Tuil","year":"2006","unstructured":"Tuil, W., et al.: Patient-centred care: using online personal medical records in IVF practice. Hum. Reprod.\u00a021(11), 2955\u20132959 (2006)","journal-title":"Hum. Reprod."},{"issue":"7449","key":"8_CR17","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1136\/bmj.328.7449.1159","volume":"328","author":"J. Ralston","year":"2004","unstructured":"Ralston, J., et al.: Patients\u2019 experience with a diabetes support programme based on an interactive electronic medical record: qualitative study. BMJ\u00a0328(7449), 1159 (2004)","journal-title":"BMJ"},{"issue":"2","key":"8_CR18","doi-asserted-by":"publisher","first-page":"20","DOI":"10.2196\/jmir.7.2.e20","volume":"7","author":"W. Himmel","year":"2005","unstructured":"Himmel, W., et al.: Information needs and visitors\u2019 experience of an internet expert forum on infertility. J. Med. Internet Res.\u00a07(2), e20 (2005)","journal-title":"J. Med. Internet Res."},{"key":"8_CR19","unstructured":"Patientslikeme, http:\/\/www.patientslikeme.com\/"},{"issue":"2","key":"8_CR20","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1197\/jamia.M1471","volume":"11","author":"J.S. Ash","year":"2003","unstructured":"Ash, J.S., Berg, M., Coiera, E.: Some unintended consequences of information technology in health care: The nature of patient care information system-related errors. Journal of the American Medical Informatics Association\u00a011(2), 104\u2013112 (2003)","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"2","key":"8_CR21","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1197\/jamia.M1471","volume":"11","author":"J. Ash","year":"2004","unstructured":"Ash, J., et al.: Some unintended consequences of information technology in health care: The nature of patient care information system-related errors. J. Am. Med. Inform. Assoc.\u00a011(2), 104\u2013112 (2004)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"8_CR22","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1145\/1031607.1031632","volume-title":"Proc. CSCW","author":"G. Hardstone","year":"2004","unstructured":"Hardstone, G., et al.: Supporting informality: team working and integrated care records. In: Proc. CSCW, pp. 142\u2013151. ACM Press, New York (2004)"},{"issue":"3","key":"8_CR23","first-page":"6","volume":"44","author":"H. Potts","year":"2005","unstructured":"Potts, H.: Online support groups: an overlooked resource for patients. He@lth Information on the Internet\u00a044(3), 6\u20138 (2005)","journal-title":"He@lth Information on the Internet"},{"issue":"3","key":"8_CR24","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1055\/s-0038-1634081","volume":"45","author":"A. Shabo","year":"2006","unstructured":"Shabo, A.: A global socio-economic-medico-legal model for the sustainability of longitudinal electronic health records, part 1. Methods of Information in Medicine\u00a045(3), 240\u2013245 (2006)","journal-title":"Methods of Information in Medicine"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Abiteboul, S., Greenshpan, O., Milo, T., Polyzotis, N.: Matchup: Autocompletion for mashups. In: ICDE (2009)","DOI":"10.1109\/ICDE.2009.47"},{"key":"8_CR26","first-page":"775","volume-title":"WWW 2008: Proceeding of the 17th international conference on World Wide Web","author":"A.V. Riabov","year":"2008","unstructured":"Riabov, A.V., Boillet, E., Feblowitz, M.D., Liu, Z., Ranganathan, A.: Wishful search: interactive composition of data mashups. In: WWW 2008: Proceeding of the 17th international conference on World Wide Web, pp. 775\u2013784. ACM, New York (2008)"},{"issue":"10","key":"8_CR27","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MC.2007.367","volume":"40","author":"G. Lawton","year":"2007","unstructured":"Lawton, G.: Web 2.0 creates security challenges. Computer\u00a040(10), 13\u201316 (2007)","journal-title":"Computer"},{"key":"8_CR28","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1145\/1242572.1242655","volume-title":"WWW 2007: Proceedings of the 16th international conference on World Wide Web","author":"C. Jackson","year":"2007","unstructured":"Jackson, C., Wang, H.J.: Subspace: secure cross-domain communication for web mashups. In: WWW 2007: Proceedings of the 16th international conference on World Wide Web, pp. 611\u2013620. ACM, New York (2007)"},{"key":"8_CR29","unstructured":"Erlingsson, \u00da., Livshits, B., Xie, Y.: End-to-end web application security. In: HOTOS 2007: Proceedings of the 11th USENIX workshop on Hot topics in operating systems, Berkeley, CA, USA, USENIX Association, pp. 1\u20136 (2007)"},{"issue":"11","key":"8_CR30","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/MC.2007.383","volume":"40","author":"M. Davidson","year":"2007","unstructured":"Davidson, M., Yoran, E.: Enterprise security for web 2.0. Computer\u00a040(11), 117\u2013119 (2007)","journal-title":"Computer"},{"key":"8_CR31","first-page":"535","volume-title":"WWW 2008: Proceeding of the 17th international conference on World Wide Web","author":"F. Keukelaere De","year":"2008","unstructured":"De Keukelaere, F., Bhola, S., Steiner, M., Chari, S., Yoshihama, S.: Smash: secure component model for cross-domain mashups on unmodified browsers. In: WWW 2008: Proceeding of the 17th international conference on World Wide Web, pp. 535\u2013544. ACM, New York (2008)"},{"key":"8_CR32","first-page":"127","volume-title":"RBAC 1997: Proceedings of the second ACM workshop on Role-based access control","author":"J. Barkley","year":"1997","unstructured":"Barkley, J.: Comparing simple role based access control models and access control lists. In: RBAC 1997: Proceedings of the second ACM workshop on Role-based access control, pp. 127\u2013132. ACM, New York (1997)"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Pawlson, L.G.: An introduction to quality assurance in health care - avedis donabedian, p. 240. Oxford university press, New York (2003); $37.95, hardcover. isbn 0-19-515809-1; American Journal of Preventive Medicine\u00a026(1), 96 (2004)","DOI":"10.1016\/j.amepre.2003.09.013"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Zahoor, E., Perrin, O., Godart, C.: Mashup model and verification using mashup processing network (2008)","DOI":"10.1007\/978-3-642-03354-4_47"},{"key":"8_CR35","unstructured":"Anyanwu, K., Sheth, A., Cardoso, J., Miller, J., Kochut, K.: Healthcare enterprise process development and integration. Journal of Research and Practice in Information Technology, Special Issue in Health Knowledge Management, 83\u201398 (1999)"}],"container-title":["Lecture Notes in Computer Science","Next Generation Information Technologies and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04941-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T20:47:14Z","timestamp":1685134034000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04941-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642049408","9783642049415"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04941-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}