{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:15:02Z","timestamp":1742915702121,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031156878"},{"type":"electronic","value":"9783031156885"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15688-5_2","type":"book-chapter","created":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T23:02:42Z","timestamp":1661814162000},"page":"18-26","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Privacy in Internet of Things Ecosystems \u2013 Prerequisite for the Ethical Data Collection and Use by Companies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3500-6974","authenticated-orcid":false,"given":"Mikko","family":"Vermanen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8832-5616","authenticated-orcid":false,"given":"Minna M.","family":"Rantanen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8325-9277","authenticated-orcid":false,"given":"Jani","family":"Koskinen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,30]]},"reference":[{"key":"2_CR1","unstructured":"Regulation (EU) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (general data protection regulation). Official Journal of the European Union (2016)"},{"issue":"15","key":"2_CR2","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"issue":"5","key":"2_CR3","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1341305","volume":"4","author":"L Brandeis","year":"1890","unstructured":"Brandeis, L., Warren, S.: The right to privacy. Harv. Law Rev. 4(5), 193\u2013220 (1890). https:\/\/doi.org\/10.2307\/1341305","journal-title":"Harv. Law Rev."},{"issue":"4","key":"2_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3333501","volume":"52","author":"ZB Celik","year":"2019","unstructured":"Celik, Z.B., Fernandes, E., Pauley, E., Tan, G., McDaniel, P.: Program analysis of commodity IoT applications for security and privacy: challenges and opportunities. ACM Comput. Surv. (CSUR) 52(4), 1\u201330 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.future.2017.07.060","volume":"78","author":"M Conti","year":"2018","unstructured":"Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of things security and forensics: challenges and opportunities. Futur. Gener. Comput. Syst. 78, 544\u2013546 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"7","key":"2_CR6","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"2_CR7","unstructured":"Hakkala, A., Koskinen, J.: Personal data protection in the age of mass surveillance. J. Comput. Secur. 1\u201325 (2022)"},{"key":"2_CR8","volume-title":"Socio-Technical Design: Strategies in Multidisciplinary Research","author":"PG Herbst","year":"1974","unstructured":"Herbst, P.G.: Socio-Technical Design: Strategies in Multidisciplinary Research. Tavistock, London (1974)"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Hirschheim, R., Klein, H.K.: Realizing emancipatory principles in information systems development: the case for ethics. MIS Q. 18(1), 83\u2013109 (1994). https:\/\/doi.org\/10.2307\/249611","DOI":"10.2307\/249611"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Holvast, J.: History of privacy. In: The History of Information Security, pp. 737\u2013 769. Elsevier (2007)","DOI":"10.1016\/B978-044451608-4\/50028-6"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future internet: the internet of things architecture, possible applications and key challenges. In: 2012 10th International Conference on Frontiers of Information Technology, pp. 257\u2013260. IEEE (2012)","DOI":"10.1109\/FIT.2012.53"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Koskinen, J., Knaapi-Junnila, S., Rantanen, M.M.: What if we had fair, people centred data economy ecosystems? In: 2019 IEEE SmartWorld, UbiquIntelligenceigence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), pp. 329\u2013 334. IEEE (2019)","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00100"},{"issue":"4","key":"2_CR13","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Lee, K.: The internet of things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Madakam, S., Lake, V., Lake, V., Lake, V., et al.: Internet of things (IoT): a literature review. J. Comput. Commun. 3(05), 164\u2013173 (2015). https:\/\/doi.org\/10.4236\/jcc.2015.35021","DOI":"10.4236\/jcc.2015.35021"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Mason, R.O.: Four ethical issues of the information age. MIS Q. 5\u201312 (1986). https:\/\/doi.org\/10.2307\/248873","DOI":"10.2307\/248873"},{"issue":"7","key":"2_CR16","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497\u20131516 (2012)","journal-title":"Ad Hoc Netw."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Riedl, B., Grascher, V., Fenz, S., Neubauer, T.: Pseudonymization for improving the privacy in e-health applications. In: Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), p. 255. IEEE (2008)","DOI":"10.1109\/HICSS.2008.366"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Royakkers, L., Timmer, J., Kool, L., van Est, R.: Societal and ethical issues of digitization. Ethics Inf. Technol. 20(2), 127\u2013142 (2018)","DOI":"10.1007\/s10676-018-9452-x"},{"key":"2_CR19","first-page":"685","volume":"58","author":"F Schauer","year":"1978","unstructured":"Schauer, F.: Fear, risk and the first amendment: unraveling the chilling effect. BUL Rev. 58, 685 (1978)","journal-title":"BUL Rev."},{"issue":"2","key":"2_CR20","doi-asserted-by":"publisher","first-page":"1628","DOI":"10.1109\/JIOT.2019.2898113","volume":"6","author":"KR Sollins","year":"2019","unstructured":"Sollins, K.R.: IoT big data security and privacy versus innovation. IEEE Internet Things J. 6(2), 1628\u20131635 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"2_CR21","doi-asserted-by":"publisher","first-page":"205395171773633","DOI":"10.1177\/2053951717736335","volume":"4","author":"L Taylor","year":"2017","unstructured":"Taylor, L.: What is data justice? The case for connecting digital rights and freedoms globally. Big Data Soc. 4(2), 2053951717736335 (2017)","journal-title":"Big Data Soc."},{"key":"2_CR22","doi-asserted-by":"publisher","unstructured":"Tikkinen-Piri, C., Rohunen, A., Markkula, J.: EU general data protection regulation: changes and implications for personal data collecting companies. Comput. Law Secur. Rev. 34(1), 134\u2013 153 (2018). https:\/\/doi.org\/10.1016\/j.clsr.2017.05.015, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0267364917301966","DOI":"10.1016\/j.clsr.2017.05.015"},{"key":"2_CR23","doi-asserted-by":"publisher","unstructured":"Trist, E.L., Bamforth, K.W.: Some social and psychological consequences of the longwall method of coal-getting: an examination of the psychological situation and defences of a work group in relation to the social structure and technological content of the work system. Hum. Relat. 4(1), 3\u201338 (1951). https:\/\/doi.org\/10.1177\/001872675100400101","DOI":"10.1177\/001872675100400101"},{"key":"2_CR24","doi-asserted-by":"publisher","unstructured":"Vermanen, M., Harkke, V.: Findings from multipurpose IoT solution experimentations in Finnish SMEs: common expectations and challenges. In: Proceedings of the 52nd Hawaii International Conference on System Sciences, pp. 5246\u20135255 (2019). https:\/\/doi.org\/10.24251\/HICSS.2019.631","DOI":"10.24251\/HICSS.2019.631"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"Vermanen, M., Koskinen, J., Harkke, V.: Internet of things (IoT) data accessibility: ethical considerations. In: Cacace, M., et al. (eds.) Well-Being in the Information Society. Fruits of Respect, pp. 197\u2013208. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57847-3_14","DOI":"10.1007\/978-3-030-57847-3_14"},{"key":"2_CR26","doi-asserted-by":"publisher","unstructured":"Vermanen, M., Rantanen, M.M., Harkke, V.: Ethical framework for IoT deployment in SMEs: individual perspective. Internet Res. https:\/\/doi.org\/10.1108\/INTR-08-2019-0361","DOI":"10.1108\/INTR-08-2019-0361"},{"key":"2_CR27","doi-asserted-by":"publisher","unstructured":"Wachter, S.: Normative challenges of identification in the internet of things: Privacy, profiling, discrimination, and the GDPR. Comput. Law Secur. Rev. 34(3), 436\u2013449 (2018). https:\/\/doi.org\/10.1016\/j.clsr.2018.02.002, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0267364917303904","DOI":"10.1016\/j.clsr.2018.02.002"},{"issue":"1","key":"2_CR28","first-page":"166","volume":"25","author":"AF Westin","year":"1968","unstructured":"Westin, A.F.: Privacy and freedom. Washington Lee Law Rev. 25(1), 166 (1968)","journal-title":"Washington Lee Law Rev."},{"issue":"1","key":"2_CR29","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s10869-018-9532-2","volume":"34","author":"AB Yost","year":"2019","unstructured":"Yost, A.B., Behrend, T.S., Howardson, G., Darrow, J.B., Jensen, J.M.: Reactance to electronic surveillance: a test of antecedents and outcomes. J. Bus. Psychol. 34(1), 71\u201386 (2019)","journal-title":"J. Bus. Psychol."}],"container-title":["IFIP Advances in Information and Communication Technology","Human Choice and Digital by Default: Autonomy vs Digital Determination"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15688-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T23:06:26Z","timestamp":1661814386000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15688-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031156878","9783031156885"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15688-5_2","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"30 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Human Choice and Computers","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hcc15.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}