{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:25:32Z","timestamp":1725809132041},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319131016"},{"type":"electronic","value":"9783319131023"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13102-3_56","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T10:24:40Z","timestamp":1415960680000},"page":"337-344","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation of \u201cFair Trade\u201d Metaphor as a Control Privacy Method for Pervasive Environments"],"prefix":"10.1007","author":[{"given":"Esquivel Salas","family":"Abraham","sequence":"first","affiliation":[]},{"given":"Pablo Alfonso","family":"Haya","sequence":"additional","affiliation":[]},{"given":"Xavier","family":"Alam\u00e1n","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"56_CR1","first-page":"74","volume-title":"22nd International Conference on Distributed Computing Systems (22nd ICDCS 2002)","author":"J. Muhtadi","year":"2002","unstructured":"Muhtadi, J., Campbell, R.H., Kapadia, A., Mickunas, D., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: 22nd International Conference on Distributed Computing Systems (22nd ICDCS 2002), pp. 74\u201383. IEEE, Vienna (2002)"},{"key":"56_CR2","first-page":"75","volume-title":"Proceedings of The Third European Conference on Computer Supported Cooperative Work (ECSCW 1993)","author":"V. Bellotti","year":"1993","unstructured":"Bellotti, V., Sellen, A.: Design for Privacy in Ubiquitous Computing Environments. In: Proceedings of The Third European Conference on Computer Supported Cooperative Work (ECSCW 1993), p. 75. Kluwer Academic Publishers, Milan (1993)"},{"key":"56_CR3","unstructured":"Satyanarayanan, M.: Privacy: The Achilles Heel of Pervasive Computing. IEEE Distributed Systems Online\u00a03(4) (2003)"},{"key":"56_CR4","unstructured":"Shen, Y., Pearson, S.: Privacy enhancing technologies: A review. Technical report HPL-2011-113, HP Labs (2011)"},{"key":"56_CR5","doi-asserted-by":"crossref","unstructured":"Wang, Y., Kobsa, A.: Privacy-Enhancing Technologies. In: Handbook of Research on Social and Organizational Liabilities in Information Security. IGI Global Snippet (2008)","DOI":"10.4018\/978-1-60566-132-2.ch013"},{"key":"56_CR6","unstructured":"Danezis, G., G\u00fcrses, S.: A critical review of 10 years of privacy technology. In: Proceedings of Surveillance Cultures: A Global Surveillance Society?, UK (2010)"},{"issue":"3","key":"56_CR7","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"D. Solove","year":"2006","unstructured":"Solove, D.: A taxonomy of privacy. University of Pennsylvania Law Review\u00a0154(3), 477 (2006)","journal-title":"University of Pennsylvania Law Review"},{"issue":"2","key":"56_CR8","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MPRV.2003.1186716","volume":"1","author":"A. Stone","year":"2003","unstructured":"Stone, A.: The Dark Side of Pervasive Computing. IEEE Pervasive Computing\u00a01(2), 4\u20138 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"56_CR9","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1145\/642611.642635","volume-title":"Proceedings of the 2003 Conference on Human Factors in Computing Systems","author":"L. Palen","year":"2003","unstructured":"Palen, L., Dourish, P.: Unpacking \u201cprivacy\u201d for a networked world. In: Proceedings of the 2003 Conference on Human Factors in Computing Systems, pp. 129\u2013136. ACM Press, Ft. Lauderdale (2003)"},{"key":"56_CR10","doi-asserted-by":"crossref","unstructured":"Langheinrich, M.: Privacy in Ubiquitous Computing. In: Krumm, J. (ed.) Ubiquitous Computing Fundamentals, pp. 95\u2013160. CRC Press (2009)","DOI":"10.1201\/9781420093612.ch3"},{"key":"56_CR11","doi-asserted-by":"crossref","unstructured":"Esquivel, A., Haya, P.A., Garc\u00eda-Herranz, M., Alam\u00e1n, X.: Managing Pervasive Environment Privacy Using the \u201cFair Trade\u201d Metaphor. In: Meersman, R., Tari, Z. (eds.) OTM-Ws 2007, Part II. LNCS, vol.\u00a04806, pp. 804\u2013813. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-76890-6_6"},{"key":"56_CR12","doi-asserted-by":"crossref","unstructured":"Haya, P.A., Montoro, G., Alam\u00e1n, X.: A Prototype of a Context-Based Architecture for Intelligent Home Environments. In: Meersman, R. (ed.) CoopIS\/DOA\/ODBASE 2004. LNCS, vol.\u00a03290, pp. 477\u2013491. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-30468-5_30"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13102-3_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,22]],"date-time":"2022-04-22T05:10:44Z","timestamp":1650604244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13102-3_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319131016","9783319131023"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13102-3_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}