{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:32:56Z","timestamp":1725496376644},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77090-9_2","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T17:19:26Z","timestamp":1196097566000},"page":"12-21","source":"Crossref","is-referenced-by-count":3,"title":["A Critical Approach to Privacy Research in Ubiquitous Environments \u2013 Issues and Underlying Assumptions"],"prefix":"10.1007","author":[{"given":"Maria","family":"Karyda","sequence":"first","affiliation":[]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Dumortier, J., Goemans, C.: Roadmap for European Legal Research in Privacy and Identity Management, Interdisciplinary Centre for Law and ICT (ICRI), K.U. Leuven (December 2002)","key":"2_CR1"},{"doi-asserted-by":"crossref","unstructured":"Eymann, T., Morito, H.: Privacy Issues of Combining Ubiquitous Computing and Software Agent Technology in a Life-Critical Environment. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (2004)","key":"2_CR2","DOI":"10.1109\/ICSMC.2004.1401090"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45809-3_9","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"J.L. Crowley","year":"2002","unstructured":"Crowley, J.L., Coutaz, J., Rey, G., Reignier, P.: Perceptual Components for Context Aware Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, Springer, Heidelberg (2002)"},{"unstructured":"Persson, P.: Social Ubiquitous Computing. In: Workshop on Building the Ubiquitous Computing User Experience, ACM\/SIGCHI, Seattle (2001)","key":"2_CR4"},{"doi-asserted-by":"crossref","unstructured":"\u010cas, J.: Privacy in Pervasive Computing Environments \u2013 A Contradiction in Terms? IEEE Technology and Society Magazine, 24\u201333 (Spring 2005)","key":"2_CR5","DOI":"10.1109\/MTAS.2005.1407744"},{"issue":"3","key":"2_CR6","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1108\/09685220410542615","volume":"12","author":"S. Gritzalis","year":"2004","unstructured":"Gritzalis, S.: Enhancing Web Privacy and Anonymity in the Digital Era. Information Management and Computer Security\u00a012(3), 255\u2013288 (2004)","journal-title":"Information Management and Computer Security"},{"unstructured":"Center for Democracy and Technology, Fair Information Practices, available at http:\/\/www.cdt.org\/","key":"2_CR7"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Ubicomp 2001","author":"M. Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by design \u2013 principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) Ubicomp 2001. LNCS, vol.\u00a02201, pp. 273\u2013291. Springer, Heidelberg (2001)"},{"key":"2_CR9","volume-title":"Anonymity for Users of Mobile Devices through Location Addressing","author":"A. Zugenmaier","year":"2002","unstructured":"Zugenmaier, A.: Anonymity for Users of Mobile Devices through Location Addressing. Rhombos Verlag, Berlin (2002)"},{"unstructured":"The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, World Wide Web Consortium (September 2001), http:\/\/www.w3.org","key":"2_CR10"},{"doi-asserted-by":"crossref","unstructured":"Miles, G., Friday, A., Davies, N.: Preserving Privacy in Environments with Location-Based Applications. Pervasive Computing, 56\u201364 (2003)","key":"2_CR11","DOI":"10.1109\/MPRV.2003.1186726"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 237\u2013245. Springer, Heidelberg (2002)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/3-540-45809-3_14","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"X. Jiang","year":"2002","unstructured":"Jiang, X., Hong, J.I., Landay, J.A.: Approximate Information Flows: Socially Based Modeling of Privacy in Ubiquitous Computing. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 176\u2013193. Springer, Heidelberg (2002)"},{"issue":"2","key":"2_CR14","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/767193.767196","volume":"3","author":"A. Kobsa","year":"2003","unstructured":"Kobsa, A., Schreck, J.: Privacy through Pseudonymity in User-Adaptive Systems. Transactions on Internet Technology\u00a03(2), 149\u2013183 (2003)","journal-title":"Transactions on Internet Technology"},{"doi-asserted-by":"crossref","unstructured":"Beckwith R.: Designing for Ubiquity: The Perception of Privacy. Pervasive Computing, 40-46 (April-June 2003)","key":"2_CR15","DOI":"10.1109\/MPRV.2003.1203752"},{"unstructured":"Hann, I., Hui, K., Lee, T., Png, I.: Online Information Privacy: Measuring the Cost-Benefit Trade-Off. In: Proc. of the 23rd International Conference on Information Systems (2002)","key":"2_CR16"},{"issue":"3","key":"2_CR17","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"D.J. Solove","year":"2006","unstructured":"Solove, D.J.: A taxonomy of privacy. University of Pennsylvania Law Review\u00a0154(3), 477\u2013564 (2006)","journal-title":"University of Pennsylvania Law Review"},{"unstructured":"Rodota, S.: Privacy, freedom and dignity \u2013 Closing remarks at the 26th International Conference on Privacy and Personal Data Protection, Wroclaw (16.09.2004)","key":"2_CR18"},{"unstructured":"Lasprogata, G., King, N., Pillay, S.: Regulation of Electronic Employee Monitoring: Identifying fundamental principles of employee privacy through a comparative study of data privacy legislation in the European Union, United States and Canada, Stanford Technology Law Review, 4 (2004), http:\/\/stlr.stanford.edu\/STLR\/Article?04_STLR_4","key":"2_CR19"}],"container-title":["Lecture Notes in Computer Science","Emerging Directions in Embedded and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77090-9_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:58:34Z","timestamp":1619521114000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77090-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770893"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77090-9_2","relation":{},"subject":[]}}