{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:25:31Z","timestamp":1776083131288,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030502485","type":"print"},{"value":"9783030502492","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50249-2_39","type":"book-chapter","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T23:07:54Z","timestamp":1594336074000},"page":"545-564","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Two Faces of Privacy: Legal and Human-Centered Perspectives of Lifelogging Applications in Home Environments"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7163-3492","authenticated-orcid":false,"given":"Wiktoria","family":"Wilkowska","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1870-2775","authenticated-orcid":false,"given":"Julia","family":"Offermann-van Heek","sequence":"additional","affiliation":[]},{"given":"Liane","family":"Colonna","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6105-4729","authenticated-orcid":false,"given":"Martina","family":"Ziefle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"39_CR1","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1109\/JBHI.2012.2234129","volume":"17","author":"P Rashidi","year":"2012","unstructured":"Rashidi, P., Mihailidis, A.: A survey on ambient-assisted living tools for older adults. IEEE J. Biomed. Health Inform. 17, 579\u2013590 (2012)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"39_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.ijmedinf.2014.01.004","volume":"83","author":"ST Peek","year":"2014","unstructured":"Peek, S.T., Wouters, E.J., Van Hoof, J., Luijkx, K.G., Boeije, H.R., Vrijhoef, H.J.: Factors influencing acceptance of technology for aging in place: a systematic review. Int. J. Med. Inform. 83, 235\u2013248 (2014). https:\/\/doi.org\/10.1016\/j.ijmedinf.2014.01.004","journal-title":"Int. J. Med. Inform."},{"key":"39_CR3","unstructured":"General Data Protection Regulation: Regulation (EU) 2016\/679 General Data Protection Regulation (GDPR), O.J. (2016)"},{"issue":"1","key":"39_CR4","first-page":"47","volume":"75","author":"AL Allen","year":"2008","unstructured":"Allen, A.L.: Dredging up the past: lifelogging, memory, and surveillance. Univ. Chicago Law Rev. 75(1), 47\u201374 (2008)","journal-title":"Univ. Chicago Law Rev."},{"issue":"1","key":"39_CR5","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1093\/ijlit\/eay018","volume":"27","author":"L Colonna","year":"2019","unstructured":"Colonna, L.: Legal and regulatory challenges to utilizing lifelogging technologies for the frail and sick. Int. J. Law Inf. Technol. 27(1), 50\u201374 (2019)","journal-title":"Int. J. Law Inf. Technol."},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the 28th International Conference on Very Large Data Bases, VLDB 2002, Hong Kong, China, pp. 143\u2013154 (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-0-387-48533-1_17","volume-title":"Handbook of Database Security","author":"T Grandison","year":"2008","unstructured":"Grandison, T., Johnson, C., Kiernan, J.: Hippocratic databases: current capabilities and future trends. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, pp. 409\u2013429. Springer, Boston (2008). https:\/\/doi.org\/10.1007\/978-0-387-48533-1_17"},{"key":"39_CR8","first-page":"895","volume":"85","author":"SR Makker","year":"2017","unstructured":"Makker, S.R.: Overcoming \u201cFoggy\u201d notions of privacy: how data minimization will enable privacy in the internet of things. Univ. Missouri-Kansas Law Rev. 85, 895 (2017)","journal-title":"Univ. Missouri-Kansas Law Rev."},{"key":"39_CR9","unstructured":"Data Protection Working Party: Opinion of the Article 29. Data Protection Working Party on Anonymisation Techniques, 0829\/14\/EN WP 216, 10 April 2014"},{"key":"39_CR10","unstructured":"Kotschy, W.: The New General \u2013 Is There Sufficient Pay-off for Taking the Trouble to Anonymize or Pseudonymize Data? Ludwig Boltzmann Institute for Human Rights, Vienna (2016)"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Fl\u00f3rez-Revuelta, F., Mihailidis, A., Ziefle, M., Colonna, L., Spinsante, S.: Privacy-aware and acceptable lifelogging services for older and frail people: the PAAL project. Presentation at the IEEE 8th International Conference on Consumer Electronics, Berlin (ICCE-Berlin) (2018)","DOI":"10.1109\/ICCE-Berlin.2018.8576191"},{"key":"39_CR12","first-page":"1701","volume":"57","author":"P Ohm","year":"2010","unstructured":"Ohm, P.: Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Rev. 57, 1701 (2010)","journal-title":"UCLA Law Rev."},{"key":"39_CR13","first-page":"1","volume":"25","author":"J Yakowitz","year":"2011","unstructured":"Yakowitz, J.: Tragedy of the data commons. Harvard J. Law Technol. 25, 1 (2011)","journal-title":"Harvard J. Law Technol."},{"key":"39_CR14","first-page":"1814","volume":"86","author":"PM Schwartz","year":"2011","unstructured":"Schwartz, P.M., Solove, D.J.: The PII problem: privacy and a new concept of personally identifiable information. New York Univ. Law Rev. 86, 1814 (2011)","journal-title":"New York Univ. Law Rev."},{"key":"39_CR15","first-page":"703","volume":"91","author":"I Rubinstein","year":"2016","unstructured":"Rubinstein, I., Hartzog, W.: Anonymization and risk. Wash. Law Rev. 91, 703 (2016)","journal-title":"Wash. Law Rev."},{"key":"39_CR16","unstructured":"Colonna, L., Mihailidis, A.: A methodological approach to privacy by design within the context of lifelogging technologies. Rutgers Comput. Technol. Law J. (Rutgers Newark) (2020, forthcoming)"},{"key":"39_CR17","doi-asserted-by":"publisher","unstructured":"G\u00f6vercin, M., Meyer, S., Schellenbach, M., Steinhagen-Thiessen, E., Weiss, B., Haesner, M.: SmartSenior@home: acceptance of an integrated ambient assisted living system. Results of a clinical field trial in 35 households. Inform. Health Soc. Care 41, 430\u2013447 (2016). https:\/\/doi.org\/10.3109\/17538157. 2015.1064425","DOI":"10.3109\/17538157"},{"issue":"2","key":"39_CR18","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1177\/0733464807311435","volume":"27","author":"K Wild","year":"2008","unstructured":"Wild, K., Boise, L., Lundell, J., Foucek, A.: Unobtrusive in-home monitoring of cognitive and physical health: reactions and perceptions of older adults. J. Appl. Gerontol. 27(2), 181\u2013200 (2008)","journal-title":"J. Appl. Gerontol."},{"issue":"2","key":"39_CR19","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/s12126-010-9083-y","volume":"36","author":"L Lorenzen-Huber","year":"2011","unstructured":"Lorenzen-Huber, L., Boutain, M., Camp, L.J., Shankar, K., Connelly, K.H.: Privacy, technology, and aging: a proposed framework. Ageing Int. 36(2), 232\u2013252 (2011). https:\/\/doi.org\/10.1007\/s12126-010-9083-y","journal-title":"Ageing Int."},{"key":"39_CR20","doi-asserted-by":"publisher","first-page":"12959","DOI":"10.3390\/s150612959","volume":"15","author":"J Padilla-Lopez","year":"2015","unstructured":"Padilla-Lopez, J., Chaaraoui, A., Gu, F., Florez-Revuelta, F.: Visual privacy by context: proposal and evaluation of a level-based visualisation scheme. Sensors 15, 12959\u201312982 (2015)","journal-title":"Sensors"},{"key":"39_CR21","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1016\/j.pmcj.2017.03.003","volume":"40","author":"MS Ferdous","year":"2017","unstructured":"Ferdous, M.S., Chowdhury, S., Jose, J.M.: Analysing privacy in visual lifelogging. Pervasive Mob. Comput. 40, 430\u2013449 (2017)","journal-title":"Pervasive Mob. Comput."},{"issue":"1","key":"39_CR22","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1186\/s12877-019-1132-0","volume":"19","author":"O Gelonch","year":"2019","unstructured":"Gelonch, O., et al.: Acceptability of a lifelogging wearable camera in older adults with mild cognitive impairment: a mixed-method study. BMC Geriatr. 19(1), 110 (2019)","journal-title":"BMC Geriatr."},{"key":"39_CR23","doi-asserted-by":"publisher","first-page":"433","DOI":"10.4017\/gt.2010.09.04.007.00","volume":"9","author":"CD Steggell","year":"2010","unstructured":"Steggell, C.D., Hooker, K., Bowman, S., Choun, S., Kim, S.J.: The role of technology for healthy aging among Korean and Hispanic women in the United States: a pilot study. Gerontechnology 9, 433\u2013449 (2010). https:\/\/doi.org\/10.4017\/gt.2010.09.04.007.00","journal-title":"Gerontechnology"},{"key":"39_CR24","doi-asserted-by":"publisher","first-page":"143","DOI":"10.3109\/17538157.2014.965305","volume":"41","author":"J Joe","year":"2016","unstructured":"Joe, J., Chaudhuri, S., Chung, J., Thompson, H., Demiris, G.: Older adults\u2019 attitudes and preferences regarding a multifunctional wellness tool: a pilot study. Inform Health Soc Care 41, 143\u2013158 (2016). https:\/\/doi.org\/10.3109\/17538157.2014.965305","journal-title":"Inform Health Soc Care"},{"key":"39_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-13137-1","volume-title":"Lifelogging: Digital Self-Tracking and Lifelogging-Between Disruptive Technology and Cultural Transformation","author":"S Selke","year":"2016","unstructured":"Selke, S.: Lifelogging: Digital Self-Tracking and Lifelogging-Between Disruptive Technology and Cultural Transformation. Springer, Wiesbaden (2016). https:\/\/doi.org\/10.1007\/978-3-658-13137-1"},{"key":"39_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1500000033","volume":"8","author":"C Gurrin","year":"2014","unstructured":"Gurrin, C., Smeaton, A.F., Doherty, A.R.: Lifelogging: personal big data. Found. Trends\u00ae Inf. Retrieval 8, 1\u2013125 (2014). https:\/\/doi.org\/10.1561\/1500000033","journal-title":"Found. Trends\u00ae Inf. Retrieval"},{"key":"39_CR27","series-title":"AME","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-94-017-9181-6_13","volume-title":"Approaches to Qualitative Research in Mathematics Education","author":"P Mayring","year":"2015","unstructured":"Mayring, P.: Qualitative content analysis: theoretical background and procedures. In: Bikner-Ahsbahs, A., Knipping, C., Presmeg, N. (eds.) Approaches to Qualitative Research in Mathematics Education. AME, pp. 365\u2013380. Springer, Dordrecht (2015). https:\/\/doi.org\/10.1007\/978-94-017-9181-6_13"},{"issue":"3","key":"39_CR28","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1525\/aa.1964.66.3.02a00880","volume":"66","author":"CE Osgood","year":"1964","unstructured":"Osgood, C.E.: Semantic differential technique in the comparative study of cultures. Am. Anthropol. 66(3), 171\u2013200 (1964)","journal-title":"Am. Anthropol."},{"key":"39_CR29","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.procs.2017.08.292","volume":"113","author":"K Abouelmehdi","year":"2017","unstructured":"Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H., Saadi, M.: Big data security and privacy in healthcare: a review. Proc. Comput. Sci. 113, 73\u201380 (2017)","journal-title":"Proc. Comput. Sci."},{"key":"39_CR30","volume-title":"Understanding Attitudes and Predicting Social Behavior","author":"I Ajzen","year":"1980","unstructured":"Ajzen, I., Fishbein, M.: Understanding Attitudes and Predicting Social Behavior, 1st edn. Prentice-Hall, Englewood Cliffs (1980)","edition":"1"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of IT for the Aged Population. Healthy and Active Aging"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50249-2_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:57:54Z","timestamp":1720573074000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50249-2_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030502485","9783030502492"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50249-2_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}