1. Burnett, C., Norman, T.J., Sycara, K.: Bootstrapping trust evaluations through stereotypes. In: Proc. 9th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp. 241–248. International Foundation for Autonomous Agents and Multiagent Systems (2010)
2. Chen, L., Crampton, J., Kollingbaum, M.J., Norman, T.J.: Obligations in risk-aware access control. In: Proc. 2012 Tenth Annual International Conference on Privacy, Security and Trust, PST 2012, pp. 145–152. IEEE Computer Society, Washington, DC (2012)
3. Ganesan, M., Prashant, S., Pushpa, V., Janakiraman, N.: The use of mobile phone as a tool for capturing patient data in southern rural Tamil Nadu, India. J. Health Informatics in Developing Countries, 219–227 (2011)
4. Halamka, J.D., Mandl, K.D., Tang, P.C.: Early experiences with personal health records. J. American Medical Informatics Association 15(1), 1–7 (2008)
5. Kroenke, K., Spitzer, R.L., Williams, J.B.W.: The PHQ-9. J. General Internal Medicine 16(9), 606–613 (2001)