{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T12:31:41Z","timestamp":1725885101384},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319577524"},{"type":"electronic","value":"9783319577531"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57753-1_2","type":"book-chapter","created":{"date-parts":[[2017,4,21]],"date-time":"2017-04-21T08:49:21Z","timestamp":1492764561000},"page":"5-22","source":"Crossref","is-referenced-by-count":3,"title":["Adapting the System to Users Based on Implicit Data: Ethical Risks and Possible Solutions"],"prefix":"10.1007","author":[{"given":"Anna","family":"Spagnolli","sequence":"first","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Giorgia","family":"Guerra","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Freeman","sequence":"additional","affiliation":[]},{"given":"David","family":"Kirsh","sequence":"additional","affiliation":[]},{"given":"Aimee","family":"van Wynsberghe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,22]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","unstructured":"Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A., Diaz, C.: The web never forgets: Persistent tracking mechanisms in the wild. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 674\u2013689. ACM (2014)","DOI":"10.1145\/2660267.2660347"},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Barfield, W.: The future to merge with AI machines. In: Cyber-Humans, pp. 267\u2013284. Springer, Cham (2015)","DOI":"10.1007\/978-3-319-25050-2_8"},{"key":"2_CR3","unstructured":"Baum, S.: Advancing smart glasses as augmented reality tool for surgeons drives Vital Medicals\u2019 capital raise. MedCityNews (2015). \nhttp:\/\/medcitynews.com\/2015\/02\/advancing-smart-glasses-augmented-reality-tool-surgeons-drives-vitals-medicals-capital-raise\/"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Bessi, A., Petroni, F., Del Vicario, M., Zollo, F., Anagnostopoulos, A., Scala, A., Zollo, F., Quattrociocchi, W.: Viral misinformation: the role of homophily and polarization. In: Proceedings of the 24th International Conference on World Wide Web, pp. 355\u2013356. ACM (2015)","DOI":"10.1145\/2740908.2745939"},{"key":"2_CR5","unstructured":"Brandom, R.: Someone\u2019s trying to gut America\u2019s strongest biometric privacy law. The verge (2016). \nhttp:\/\/www.theverge.com\/2016\/5\/27\/11794512\/facial-recognition-law-illinois-facebook-google-snapchat"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/3-540-44853-5_7","volume-title":"Intelligence and Security Informatics","author":"JK Burgoon","year":"2003","unstructured":"Burgoon, J.K., Blair, J.P., Qin, T., Nunamaker, J.F.: Detecting deception through linguistic analysis. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 91\u2013101. Springer, Heidelberg (2003). doi:\n10.1007\/3-540-44853-5_7"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Doryab, A., Bardram, J.E.: Designing activity-aware recommender systems for operating rooms. In: Proceedings of the 2011 Workshop on Context-awareness in Retrieval and Recommendation, pp. 43\u201346. ACM (2011)","DOI":"10.1145\/1961634.1961643"},{"key":"2_CR8","volume-title":"Detecting Deception: Current Challenges and Cognitive Approaches","author":"PA Granhag","year":"2015","unstructured":"Granhag, P.A., Vrij, A., Verschuere, B.: Detecting Deception: Current Challenges and Cognitive Approaches. Wiley, Chichester (2015)"},{"issue":"24","key":"2_CR9","doi-asserted-by":"publisher","first-page":"8788","DOI":"10.1073\/pnas.1320040111","volume":"111","author":"AD Kramer","year":"2014","unstructured":"Kramer, A.D., Guillory, J.E., Hancock, J.T.: Experimental evidence of massive-scale emotional contagion through social networks. Proc. Nat. Acad. Sci. 111(24), 8788\u20138790 (2014)","journal-title":"Proc. Nat. Acad. Sci."},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-1-4471-4474-8_22","volume-title":"Biomedical Informatics","author":"MA Musen","year":"2014","unstructured":"Musen, M.A., Middleton, B., Greenes, R.A.: Clinical decision-support systems. In: Shortliffe, E.H., Cimino, J.J. (eds.) Biomedical Informatics, pp. 643\u2013674. Springer, London (2014)"},{"issue":"1","key":"2_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11948-014-9621-1","volume":"22","author":"F O\u2019Brolch\u00e1in","year":"2016","unstructured":"O\u2019Brolch\u00e1in, F., Jacquemard, T., Monaghan, D., O\u2019Connor, N., Novitzky, P., Gordijn, B.: The convergence of virtual reality and social networks: threats to privacy and autonomy. Sci. Eng. Ethics 22(1), 1\u201329 (2016)","journal-title":"Sci. Eng. Ethics"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ijpsycho.2016.07.056","volume":"108","author":"G Sartori","year":"2016","unstructured":"Sartori, G., Orru, G., Monaro, M.: Detecting deception through kinematic analysis of hand movement. Int. J. Psychophysiology 108, 16 (2016)","journal-title":"Int. J. Psychophysiology"},{"issue":"10","key":"2_CR13","doi-asserted-by":"publisher","first-page":"e22","DOI":"10.1136\/jme.2007.023952","volume":"34","author":"A Wynsberghe van","year":"2008","unstructured":"van Wynsberghe, A., Gastmans, C.: Telesurgery: an ethical appraisal. J. Med. Ethics 34(10), e22 (2008)","journal-title":"J. Med. Ethics"},{"issue":"6","key":"2_CR14","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1089\/cyber.2015.0326","volume":"19","author":"AS Won","year":"2016","unstructured":"Won, A.S., Perone, B., Friend, M., Bailenson, J.N.: Identifying anxiety through tracked head movements in a virtual classroom. Cyberpsychology Behav. Soc. Networking 19(6), 380\u2013387 (2016)","journal-title":"Cyberpsychology Behav. Soc. Networking"}],"container-title":["Lecture Notes in Computer Science","Symbiotic Interaction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57753-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,4,21]],"date-time":"2017-04-21T08:49:48Z","timestamp":1492764588000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57753-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319577524","9783319577531"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57753-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}