{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:16:11Z","timestamp":1742912171466,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030551957"},{"type":"electronic","value":"9783030551964"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-55196-4_11","type":"book-chapter","created":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T23:11:38Z","timestamp":1602717098000},"page":"186-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Transparency in the Internet of\u00a0Things"],"prefix":"10.1007","author":[{"given":"Stephan","family":"Escher","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Weller","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"K\u00f6psell","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,15]]},"reference":[{"key":"11_CR1","unstructured":"General data protection regulation (2018). \nhttps:\/\/gdpr.eu\/\n\n. Accessed on 02 Apr 2020"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Cunche, M., Le Metayer, D., Morel, V.: Enhancing transparency and consent in the IoT. In: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 116\u2013119. IEEE (2018)","DOI":"10.1109\/EuroSPW.2018.00023"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Ji, X., Lu, T., Xu, W.: DeWiCam: detecting hidden wireless cameras via smartphones. In: Proceedings of ASIACCS 2018 (2018)","DOI":"10.1145\/3196494.3196509"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Cohn, J.F., et al.: Detecting depression from facial actions and vocal prosody. In: 2009 3rd International Conference on Affective Computing and Intelligent Interaction and Workshops (2009)","DOI":"10.1109\/ACII.2009.5349358"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367733","volume":"17","author":"A Das","year":"2018","unstructured":"Das, A., Degeling, M., Smullen, D., Sadeh, N.: Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice. IEEE Pervasive Comput. 17, 12 (2018)","journal-title":"IEEE Pervasive Comput."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Gomer, R., Schraefel, M.C., Gerding, E.: Consenting agents: semi-autonomous interactions for ubiquitous consent. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct Publication - UbiComp 2014 Adjunct, pp. 653\u2013658 (2014)","DOI":"10.1145\/2638728.2641682"},{"key":"11_CR7","volume-title":"Don\u2019t Make Me Think. A Common Sense Approach to Web Usability. Revisited","author":"S Krug","year":"2014","unstructured":"Krug, S.: Don\u2019t Make Me Think. A Common Sense Approach to Web Usability. Revisited. New Riders, Thousand Oaks (2014)"},{"key":"11_CR8","unstructured":"Langheinrich, M.: Personal privacy in ubiquitous computing: tools and system support. Ph.D. thesis, ETH Zurich (2005)"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/s00779-004-0304-9","volume":"8","author":"S Lederer","year":"2004","unstructured":"Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: five pitfalls for designers. Pers. Ubiquit. Comput. 8, 440\u2013454 (2004)","journal-title":"Pers. Ubiquit. Comput."},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1093\/ijlit\/eax024","volume":"26","author":"J Lindqvist","year":"2018","unstructured":"Lindqvist, J.: New challenges to personal data processing agreements: is the GDPR fit to deal with contract, accountability and liability in a world of the Internet of Things? Int. J. Law Inf. Technol. 26, 45\u201363 (2018)","journal-title":"Int. J. Law Inf. Technol."},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Morel, V., Cunche, M., Le Metayer, D.: A generic information and consent framework for the IoT. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/13th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), pp. 366\u2013373. IEEE (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00056"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"22965","DOI":"10.1109\/ACCESS.2017.2765539","volume":"5","author":"P Murmann","year":"2017","unstructured":"Murmann, P., Fischer-H\u00fcbner, S.: Tools for achieving usable ex post transparency: a survey. IEEE Access 5, 22965\u201322991 (2017)","journal-title":"IEEE Access"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Cons. Aff. 41, 100\u2013126 (2007)","journal-title":"J. Cons. Aff."},{"key":"11_CR14","unstructured":"Wegdam, M., Plas, D.J.: Empowering users to control their privacy in context-aware systems through interactive consent. CTIT Technical report Series, p. 10 (2008)"},{"key":"11_CR15","first-page":"13","volume-title":"The Computer for the 21st Century","author":"M Weiser","year":"1991","unstructured":"Weiser, M.: The Computer for the 21st Century, p. 13. Scientific American, New York (1991)"},{"key":"11_CR16","unstructured":"Zimmermann, C.: A categorization of transparency-enhancing technologies. arXiv (2015)"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-55196-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T23:27:02Z","timestamp":1602718022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-55196-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030551957","9783030551964"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-55196-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"15 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual Privacy Forum","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apf2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/privacyforum.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"https:\/\/privacyforum.eu\/","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}