{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:53:44Z","timestamp":1743036824832,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030750176"},{"type":"electronic","value":"9783030750183"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75018-3_8","type":"book-chapter","created":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T10:06:41Z","timestamp":1620382001000},"page":"124-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["PHIN: A Privacy Protected Heterogeneous IoT Network"],"prefix":"10.1007","author":[{"given":"Sanonda Datta","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Aubree","family":"Nygaard","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Kaplan","sequence":"additional","affiliation":[]},{"given":"Vijayanta","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Sepideh","family":"Ghanavati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,8]]},"reference":[{"key":"8_CR1","unstructured":"California Consumers\u2019 Privacy Act. https:\/\/oag.ca.gov\/privacy\/ccpa"},{"key":"8_CR2","unstructured":"International Data Corporation Forecast. https:\/\/tinyurl.com\/y694wg2v"},{"key":"8_CR3","unstructured":"IoT-based mobile applications and their impact on user experience. https:\/\/tinyurl.com\/hpwpjnre"},{"key":"8_CR4","unstructured":"iRobot Privacy Policy. https:\/\/tinyurl.com\/w6ghop6. Accessed May 2020"},{"key":"8_CR5","unstructured":"The EU GDPR - Article 14. https:\/\/eugdpr.org. Accessed May 2020"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Bhatia, J., Breaux, T.E.A.: Privacy risk in cybersecurity data sharing. In: Proceedings of the ACM on Workshop on ISCS, pp. 57\u201364 (2016)","DOI":"10.1145\/2994539.2994541"},{"key":"8_CR7","unstructured":"Bokaie, H.M.: Information retrieval and semantic inference from natural language privacy policies. Ph.D. thesis, The University of Texas at San Antonio (2019)"},{"issue":"3","key":"8_CR8","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s00766-013-0190-7","volume":"19","author":"TD Breaux","year":"2013","unstructured":"Breaux, T.D., Hibshi, H., Rao, A.: Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements. Requirements Eng. 19(3), 281\u2013307 (2013). https:\/\/doi.org\/10.1007\/s00766-013-0190-7","journal-title":"Requirements Eng."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Breaux, T.D., Smullen, D., Hibshi, H.: Detecting repurposing and over-collection in multi-party privacy requirements specifications. In: 2015 IEEE 23rd International Requirements Engineering Conference (RE), pp. 166\u2013175. IEEE (2015)","DOI":"10.1109\/RE.2015.7320419"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MSP.2010.84","volume":"8","author":"FH Cate","year":"2010","unstructured":"Cate, F.H.: The limits of notice and choice. IEEE Secur. Privacy 8, 59\u201362 (2010)","journal-title":"IEEE Secur. Privacy"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Emami-Naeini, P., Agarwal, Y., Cranor, L.F., Hibshi, H.: Ask the experts: what should be on an IoT privacy and security label? In: 2020 IEEE Symposium on Security and Privacy (SP)","DOI":"10.1109\/SP40000.2020.00043"},{"key":"8_CR12","unstructured":"FTC: Internet of Things: Privacy & Security in a Connected World (2015)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Gupta, S.D., Ghanavati, S.: Towards a heterogeneous IoT privacy architecture. In: The 35th ACM\/SIGAPP SAC - IoT Track (2020)","DOI":"10.1145\/3341105.3374108"},{"key":"8_CR14","unstructured":"Harkous, H., Fawaz, K., Lebret, R., Schaub, F., Shin, K.G., Aberer, K.: Polisis: automated analysis and presentation of privacy policies using deep learning. In: 27th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 2018), pp. 531\u2013548 (2018)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Liu, L., et al.: Toward detection of unsafe driving with wearables. In: Proceedings of the 2015 Workshop on WS, pp. 27\u201332. ACM","DOI":"10.1145\/2753509.2753518"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Liu, X., Leng, Y., Yang, W., Wang, W., Zhai, C., Xie, T.: A large-scale empirical study on android runtime-permission rationale messages. In: 2018 IEEE Symposium on Visual Languages and Human-Centric Computing, pp. 137\u2013146 (2018)","DOI":"10.1109\/VLHCC.2018.8506574"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Maitra, S., Suh, B., Ghanavati, S.: Privacy consistency analyzer for android applications. In: 5th International Workshop (ESPRE), pp. 28\u201333 (2018)","DOI":"10.1109\/ESPRE.2018.00011"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Mare, S., Roesner, F., Kohno, T.: Smart devices in airbnbs: considering privacy and security for both guests and hosts, vol. 2020, pp. 436\u2013458. Sciendo (2020)","DOI":"10.2478\/popets-2020-0035"},{"key":"8_CR19","first-page":"543","volume":"4","author":"AM McDonald","year":"2008","unstructured":"McDonald, A.M., Cranor, L.F.: The cost of reading privacy policies. Isjlp 4, 543 (2008)","journal-title":"Isjlp"},{"key":"8_CR20","unstructured":"Michalevsky, Y., Schulman, A.E.A.: Powerspy: location tracking using mobile device power analysis. In: 24th $$\\{$$USENIX$$\\}$$ Security Symposium, pp. 785\u2013800 (2015)"},{"key":"8_CR21","unstructured":"Naeini, P., et al.: Privacy expectations and preferences in an IoT world. In: 13th SOUPS\u2019 2017"},{"key":"8_CR22","unstructured":"National Science & Technology Council: National Privacy Research Strategy (2016) https:\/\/www.nitrd.gov\/PUBS\/NationalPrivacyResearchStrategy.pdf"},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1057\/ejis.2012.26","volume":"22","author":"RC Nickerson","year":"2013","unstructured":"Nickerson, R.C., Varshney, U., Muntermann, J.: A method for taxonomy development and its application in information systems. Eur. J. Inf. Syst. 22, 336\u2013359 (2013)","journal-title":"Eur. J. Inf. Syst."},{"key":"8_CR24","unstructured":"Okoyomon, E., et al.: On the ridiculousness of notice and consent: contradictions in app privacy policies (2019)"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Rosen, S., Qian, Z., Mao, Z.M.: Appprofiler: a flexible method of exposing privacy-related behavior in android applications to end users. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, pp. 221\u2013232 (2013)","DOI":"10.1145\/2435349.2435380"},{"key":"8_CR26","unstructured":"Safi, M., Reyes, I., Egelman, S.: Inference of user demographics and habits from seemingly benign smartphone sensors"},{"key":"8_CR27","unstructured":"Schaub, F., et al.: A design space for effective privacy notices. In: 11th Symposium On Usable Privacy and Security, pp. 1\u201317 (2015)"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Slavin, R., et al.: PVdetector: a detector of privacy-policy violations for android apps. In: IEEE\/ACM International Conference on Mobile Software Engineering & Systems, pp. 299\u2013300 (2016)","DOI":"10.1145\/2897073.2897720"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Slavin R., et al.: Toward a framework for detecting privacy policy violations in android application code. In: Proceedings of the 38th International Conference on SE, pp. 25\u201336 (2016)","DOI":"10.1145\/2884781.2884855"},{"key":"8_CR30","unstructured":"Smullen, D., et al.: Modeling, analyzing, and consistency checking privacy requirements using eddy. In: Proceedings of the Symposium and Bootcamp on the Science of Security"},{"key":"8_CR31","unstructured":"Vanderbeck, S., Bockhorst, J., Oldfather, C.: A machine learning approach to identifying sections in legal briefs. In: MAICS, pp. 16\u201322 (2011)"},{"key":"8_CR32","unstructured":"Yee, G.O.M.: An approach for protecting privacy in the IoT, pp. 2710\u20132723 (2016)"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Yu, L., Lou, X., et al.: Can we trust the privacy policies of android apps? In: 46th Annual IEEE\/IFIP International Conference on (DSN), pp. 538\u2013549. IEEE (2016)","DOI":"10.1109\/DSN.2016.55"},{"key":"8_CR34","unstructured":"Zeng, E., et al.: End user security and privacy concerns with smart homes. In: SOUPS"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Zimmeck, S., Story, P., Smullen, D., et al.: Maps: scaling privacy compliance analysis to a million apps. In: Proceedings on Privacy Enhancing Technologies 2019(3), pp. 66\u201386 (2019)","DOI":"10.2478\/popets-2019-0037"}],"container-title":["Lecture Notes in Business Information Processing","Research Challenges in Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75018-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T10:08:58Z","timestamp":1620382138000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75018-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030750176","9783030750183"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75018-3_8","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"8 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research Challenges in Information Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rcis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.rcis-conf.com\/rcis2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"99","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held online due to the COVID-19 pandemic","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}