{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:29:48Z","timestamp":1742912988249,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642102622"},{"type":"electronic","value":"9783642102639"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10263-9_27","type":"book-chapter","created":{"date-parts":[[2009,11,6]],"date-time":"2009-11-06T07:44:17Z","timestamp":1257493457000},"page":"307-318","source":"Crossref","is-referenced-by-count":0,"title":["Simulation and Analysis of Ad Hoc Privacy Control in Smart Environments"],"prefix":"10.1007","author":[{"given":"Christian","family":"B\u00fcnnig","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","volume-title":"The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding","author":"I. Altman","year":"1975","unstructured":"Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Cole Publishing Company, Monterey (1975)"},{"key":"27_CR2","first-page":"129","volume-title":"CHI 2003: Proc. of the SIGCHI Conference on Human Factors in Computing Systems","author":"L. Palen","year":"2003","unstructured":"Palen, L., Dourish, P.: Unpacking \u201cprivacy\u201d for a networked world. In: CHI 2003: Proc. of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129\u2013136. ACM, New York (2003)"},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, pp. 315\u2013320. Springer, Heidelberg (2002)"},{"key":"27_CR4","unstructured":"W3C: The platform for privacy preferences 1.0 (P3P1.0) specification (April 2002), \n                      http:\/\/www.w3.org\/TR\/P3P\/\n                     (accessed December 12, 2008)"},{"issue":"2","key":"27_CR5","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1165734.1165735","volume":"13","author":"L.F. Cranor","year":"2006","unstructured":"Cranor, L.F., Guduru, P., Arjula, M.: User interfaces for privacy agents. ACM Trans. Comput.-Hum. Interact.\u00a013(2), 135\u2013178 (2006)","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"issue":"1","key":"27_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G. Myles","year":"2003","unstructured":"Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing\u00a02(1), 56\u201364 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"27_CR7","unstructured":"Prabaker, M., Rao, J., Fette, I., Kelley, P., Cranor, L., Hong, J., Sadeh, N.: Understanding and capturing people\u2019s privacy policies in a people finder application. In: UBICOMP 2007: Workshop on UBICOMP Privacy (September 2007)"},{"key":"27_CR8","unstructured":"Clau\u00df, S., Pfitzmann, A., Hansen, M.: Privacy-enhancing identity management. The IPTS Report 67, 8\u201316 (2002), \n                      http:\/\/ipts.jrc.ec.europa.eu\/home\/report\/english\/articles\/vol67\/IPT2E676.htm\n                     (accessed January 26, 2009)"},{"key":"27_CR9","unstructured":"Jendricke, U., Kreutzer, M., Zugenmaier, A.: Pervasive privacy with identity management. Technical Report 178, Institut f\u00fcr Informatik, Universit\u00e4t Freiburg (October 2002)"},{"key":"27_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/3-540-46138-8_46","volume-title":"Electronic Government","author":"N. Maibaum","year":"2002","unstructured":"Maibaum, N., Sedov, I., Cap, C.H.: A citizen digital assistant for e-government. In: Traunm\u00fcller, R., Lenk, K. (eds.) EGOV 2002. LNCS, vol.\u00a02456, pp. 284\u2013287. Springer, Heidelberg (2002)"},{"key":"27_CR11","unstructured":"Lederer, S., Mankoff, J., Dey, A.K., Beckmann, C.P.: Managing personal information disclosure in ubiquitous computing environments. Technical Report UCB\/CSD-03-1257, EECS Department, University of California, Berkeley (July 2003)"},{"issue":"6","key":"27_CR12","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/s00779-004-0304-9","volume":"8","author":"S. Lederer","year":"2004","unstructured":"Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: Five pitfalls for designers. Personal Ubiquitous Computing\u00a08(6), 440\u2013454 (2004)","journal-title":"Personal Ubiquitous Computing"},{"key":"27_CR13","unstructured":"B\u00fcnnig, C.: Learning context based disclosure of private information. In: The Internet of Things & Services - 1st Intl. Research Workshop, Valbonne, France (September 2008)"},{"key":"27_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Human Interface, Part II, HCII 2009","author":"C. B\u00fcnnig","year":"2009","unstructured":"B\u00fcnnig, C.: Smart privacy management in ubiquitous computing environments. In: Smith, M.J., Salvendy, G. (eds.) Human Interface, Part II, HCII 2009. LNCS, vol.\u00a05618. Springer, Heidelberg (2009)"},{"key":"27_CR15","unstructured":"Eagle, N., Pentland, A.: Reality mining - machine perception and learning of complex social systems (2009), \n                      http:\/\/reality.media.mit.edu\/\n                     (accessed June 12, 2009)"},{"key":"27_CR16","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1145\/765891.765952","volume-title":"CHI 2003: Extended Abstracts on Human Factors in Computing Systems","author":"S. Lederer","year":"2003","unstructured":"Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? privacy preference determinants in ubiquitous computing. In: CHI 2003: Extended Abstracts on Human Factors in Computing Systems, pp. 724\u2013725. ACM, New York (2003)"},{"key":"27_CR17","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1145\/1150402.1150531","volume-title":"Proc. of the 12th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining (KDD 2006)","author":"I. Mierswa","year":"2006","unstructured":"Mierswa, I., Wurst, M., Klinkenberg, R., Scholz, M., Euler, T.: Yale: Rapid prototyping for complex data mining tasks. In: Proc. of the 12th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining (KDD 2006), pp. 935\u2013940. ACM, New York (2006)"},{"key":"27_CR18","volume-title":"Data Mining: Practical machine learning tools and techniques","author":"I.H. Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)","edition":"2"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Cohen, W.W.: Fast effective rule induction. In: ICML, pp. 115\u2013123 (1995)","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"27_CR20","volume-title":"C4.5: Programs for Machine Learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, San Francisco (1993)"},{"key":"27_CR21","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), \n                      http:\/\/www.csie.ntu.edu.tw\/~cjlin\/papers\/libsvm.pdf\n                     (accessed June 12, 2009)"}],"container-title":["Communications in Computer and Information Science","Intelligent Interactive Assistance and Mobile Multimedia Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10263-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T21:44:47Z","timestamp":1674510287000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-10263-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642102622","9783642102639"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10263-9_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}