{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:54:19Z","timestamp":1764784459836,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503437"},{"type":"electronic","value":"9783030503444"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50344-4_25","type":"book-chapter","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T23:21:31Z","timestamp":1594336891000},"page":"348-361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Inverting the Panopticon to Safeguard Privacy in Ambient Environments: An Exploratory Study"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3214-2495","authenticated-orcid":false,"given":"Ingvar","family":"Tjostheim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9419-0682","authenticated-orcid":false,"given":"John A.","family":"Waterworth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-0-387-93808-0_1","volume-title":"Handbook of Ambient Intelligence and Smart Environments","author":"J Augusto","year":"2010","unstructured":"Augusto, J., Nakashima, H., Aghajan, H.: Ambient intelligence and smart environments: a state of the art. In: Nakashima, H., Aghajan, H., Augusto, J.C. (eds.) Handbook of Ambient Intelligence and Smart Environments, pp. 3\u201331. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-93808-0_1"},{"issue":"4","key":"25_CR2","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/BF00999209","volume":"5","author":"M Ben-Akiva","year":"1994","unstructured":"Ben-Akiva, M., et al.: Combining revealed and stated preferences data. Market. Lett. 5(4), 335\u2013349 (1994). https:\/\/doi.org\/10.1007\/BF00999209","journal-title":"Market. Lett."},{"key":"25_CR3","unstructured":"Cyphers, B., Gebhart, G.: Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance. A Publication of the Electronic Frontier Foundation, 2019 Released Under a Creative Commons Attribution 4.0 International License (CC BY 4.0) (2019)"},{"issue":"6","key":"25_CR4","first-page":"1369","volume":"117","author":"SA Elvy","year":"2017","unstructured":"Elvy, S.A.: Paying for privacy and the personal data economy. Columbia Law Rev. 117(6), 1369\u20131459 (2017)","journal-title":"Columbia Law Rev."},{"key":"25_CR5","unstructured":"Elvy, S.A.: Commodifying consumer data in the era of the Internet of Things. B.C. L. Rev. 59, 423, 446 (2018)"},{"issue":"7","key":"25_CR6","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.tele.2017.04.013","volume":"34","author":"S Barth","year":"2017","unstructured":"Barth, S., de Jong, M.: The privacy paradox \u2013 investigating discrepancies between expressed privacy concerns and actual online behavior \u2013 a systematic literature review. Telematics Inform. 34(7), 1038\u20131058 (2017)","journal-title":"Telematics Inform."},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Bentham, J.: Constitutional code, vol. 1. Rosen, F. (ed.) Clarendon Press, Oxford, 1983 (1830)","DOI":"10.1093\/oseo\/instance.00077234"},{"key":"25_CR8","volume-title":"Beyond Foucault: New Perspectives on Bentham\u2019s Panopticon","author":"A Brunon-Ernst","year":"2013","unstructured":"Brunon-Ernst, A.: Beyond Foucault: New Perspectives on Bentham\u2019s Panopticon. Ashgate, London (2013)"},{"key":"25_CR9","unstructured":"Chen, Y., et al.: Understanding the Effectiveness of Ultrasonic Microphone Jammer, vol. 1, no. 1, April 2019 (2019). 17 pages"},{"issue":"3","key":"25_CR10","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/S0167-8116(03)00034-X","volume":"20","author":"CW DeMoranville","year":"2003","unstructured":"DeMoranville, C.W., Bienstock, C.C.: Question order effects in measuring service quality. Int. J. Res. Mark. 20(3), 217\u2013231 (2003)","journal-title":"Int. J. Res. Mark."},{"issue":"1","key":"25_CR11","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s13347-016-0219-1","volume":"30","author":"M Gali\u010d","year":"2017","unstructured":"Gali\u010d, M., Timan, T., Koops, B.-J.: Bentham, Deleuze and beyond: an overview of surveillance theories from the panopticon to participation. Philos. Technol. 30(1), 9\u201337 (2017). https:\/\/doi.org\/10.1007\/s13347-016-0219-1","journal-title":"Philos. Technol."},{"key":"25_CR12","doi-asserted-by":"publisher","unstructured":"Gao, C., Fawaz, K., Sur, S., Banerjee, S.: Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries (2019). https:\/\/doi.org\/10.2478\/popets-2019-0024","DOI":"10.2478\/popets-2019-0024"},{"key":"25_CR13","first-page":"41","volume-title":"Syntax and Semantics 3: Speech Acts","author":"HP Grice","year":"1975","unstructured":"Grice, H.P.: Logic and conversation. In: Cole, P., Morgan, J.L. (eds.) Syntax and Semantics 3: Speech Acts, pp. 41\u201358. Academic Press, New York (1975)"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Li, Z., Rathore, A.S., Chen, B., Song, C., Yang, Z., Xu, W.: SpecEye: towards pervasive and privacy-preserving screen exposure detection in daily life. In: The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys 2019), 17\u201321 June 2019 (2019)","DOI":"10.1145\/3307334.3326076"},{"key":"25_CR15","doi-asserted-by":"publisher","unstructured":"Malkin, N., Deatrick, J., Tong, A., Wijesekera, P., Egelman, S., Wagner, D.: Privacy Attitudes of Smart Speaker Users (2019). https:\/\/doi.org\/10.2478\/popets-2019-0068","DOI":"10.2478\/popets-2019-0068"},{"issue":"3","key":"25_CR16","doi-asserted-by":"publisher","first-page":"331","DOI":"10.24908\/ss.v1i3.3344","volume":"1","author":"S Mann","year":"2003","unstructured":"Mann, S., Nolan, J., Wellman, B.: Sousveillance: inventing and using wearable computing devices for data collection in surveillance environments. Surveill. Soc. 1(3), 331\u2013355 (2003)","journal-title":"Surveill. Soc."},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Mann, S.: \u2018Sousveillance\u2019: inverse surveillance in multimedia imaging. In: 12th Annual ACM International Conference on Multimedia. ACM, New York (2004)","DOI":"10.1145\/1027527.1027673"},{"key":"25_CR19","unstructured":"New York Times (2020). https:\/\/www.nytimes.com\/2020\/02\/14\/technology\/alexa-jamming-bracelet-privacy-armor.html. Accessed 24 Feb 2020"},{"key":"25_CR20","unstructured":"Preibusch, S.: The value of privacy in web search. In: Proceedings of the Twelfth Workshop on the Economics of Information Security (WEIS) (2013)"},{"key":"25_CR21","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-1-4612-2848-6_3","volume-title":"Context Effects in Social and Psychological Research","author":"F Strack","year":"1992","unstructured":"Strack, F.: \u201cOrder effects\u201d in survey research: activation and information functions of preceding questions. In: Schwarz, N., Sudman, S. (eds.) Context Effects in Social and Psychological Research, pp. 23\u201334. Springer, New York (1992). https:\/\/doi.org\/10.1007\/978-1-4612-2848-6_3"},{"issue":"1","key":"25_CR22","doi-asserted-by":"publisher","first-page":"87","DOI":"10.3233\/AIS-180507","volume":"11","author":"N Streitz","year":"2019","unstructured":"Streitz, N., Charitos, D., Kaptein, M., B\u00f6hlen, M.: Grand challenges for ambient intelligence and implications for design contexts and smart societies. J. Ambient Intell. Smart Environ. 11(1), 87\u2013107 (2019). Tenth Anniversary Issue","journal-title":"J. Ambient Intell. Smart Environ."},{"key":"25_CR23","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1007\/978-3-030-40690-5_54","volume-title":"Information Technology and Systems","author":"I Tjostheim","year":"2020","unstructured":"Tjostheim, I., Waterworth, J.A.: Predicting personal susceptibility to phishing. In: Rocha, \u00c1., Ferr\u00e1s, C., Montenegro Marin, C.E., Medina Garc\u00eda, V.H. (eds.) ICITS 2020. AISC, vol. 1137, pp. 564\u2013575. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-40690-5_54"},{"key":"25_CR24","unstructured":"LNCS Homepage. http:\/\/www.springer.com\/lncs. Accessed 21 Nov 2016"}],"container-title":["Lecture Notes in Computer Science","Distributed, Ambient and Pervasive Interactions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50344-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:04:27Z","timestamp":1720569867000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50344-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030503437","9783030503444"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50344-4_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}