{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T17:13:35Z","timestamp":1763140415203},"publisher-location":"Berlin, Heidelberg","reference-count":51,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642112836"},{"type":"electronic","value":"9783642112843"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-11284-3_15","type":"book-chapter","created":{"date-parts":[[2009,12,11]],"date-time":"2009-12-11T14:08:44Z","timestamp":1260540524000},"page":"140-152","source":"Crossref","is-referenced-by-count":14,"title":["Intelligent Mobility Systems: Some Socio-technical Challenges and Opportunities"],"prefix":"10.1007","author":[{"given":"Monika","family":"B\u00fcscher","sequence":"first","affiliation":[]},{"given":"Paul","family":"Coulton","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Efstratiou","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Gellersen","sequence":"additional","affiliation":[]},{"given":"Drew","family":"Hemment","sequence":"additional","affiliation":[]},{"given":"Rashid","family":"Mehmood","sequence":"additional","affiliation":[]},{"given":"Daniela","family":"Sangiorgi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","volume-title":"After the car","author":"K. Dennis","year":"2008","unstructured":"Dennis, K., Urry, J.: After the car. Polity, London (2008)"},{"key":"15_CR2","volume-title":"Perpetual contact: Mobile communication, private talk, public performance","author":"R. Ling","year":"2002","unstructured":"Ling, R., Yttri, B.: Nobody Sits at Home and Waits for the Telephone to Ring: Micro and Hyper-Coordination Through the Use of the Mobile Phone. In: Katz, J., Aakhus, M. (eds.) Perpetual contact: Mobile communication, private talk, public performance. Cambridge University Press, Cambridge (2002)"},{"key":"15_CR3","first-page":"348","volume-title":"Leonardo","author":"D. Hemment","year":"2006","unstructured":"Hemment, D.: Locative Arts. In: Malina, R. (ed.) Leonardo, vol.\u00a0(39:4), pp. 348\u2013356. MIT Press, Cambridge (2006)"},{"key":"15_CR4","unstructured":"Southern, J.: Lines of flight. In: ISEA (2009)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Bamford, W., Coulton, P., Walker, M., Whyatt, D., Davies, G., Pooley, C.: Using Mobile Phones to Reveal the Complexities of the School Journey. In: MOBILEHCI 2008, Amsterdam, Netherlands, September 2-5 (2008)","DOI":"10.1145\/1409240.1409271"},{"key":"15_CR6","first-page":"107","volume":"41","author":"G. Lyons","year":"2007","unstructured":"Lyons, G., Jain, J., Holley, D.: The use of travel time by rail passengers in Great Britain. Transportation Research Part A\u00a041, 107\u2013120 (2007)","journal-title":"Transportation Research Part A"},{"key":"15_CR7","unstructured":"Whyte, W.: The social life of small urban spaces. Project for Public Spaces (1980)"},{"key":"15_CR8","volume-title":"Turtles, termites, and traffic jams. Explorations in massively parallel microworlds","author":"M. Resnick","year":"1994","unstructured":"Resnick, M.: Turtles, termites, and traffic jams. Explorations in massively parallel microworlds. MIT Press, Cambridge (1994)"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/S0967-070X(98)00029-8","volume":"6","author":"M. Jensen","year":"1999","unstructured":"Jensen, M.: Passion and heart in transport \u2014 a sociological analysis on transport behaviour. Transport Policy\u00a06, 19\u201333 (1999)","journal-title":"Transport Policy"},{"issue":"2","key":"15_CR10","first-page":"249","volume":"17","author":"P. Levy","year":"1997","unstructured":"Levy, P.: Education and training: New technologies and collective intelligence. Prospects\u00a017(2), 249\u2013263 (1997)","journal-title":"Prospects"},{"key":"15_CR11","volume-title":"We-think. Mass innovation, not mass production","author":"C. Leadbeater","year":"2008","unstructured":"Leadbeater, C.: We-think. Mass innovation, not mass production. Profile Books, London (2008)"},{"key":"15_CR12","unstructured":"Meroni, A., Sangiorgi, D., Simeone, G.: Intelligent mobility system sector scenarios: Service design to foster sustainable mobility within urban areas. In: Emergence Conference, Pittsburgh (September 2007)"},{"issue":"4-5","key":"15_CR13","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1177\/0263276404046070","volume":"21","author":"E. Laurier","year":"2004","unstructured":"Laurier, E.: Doing Office Work on the Motorway. Theory, Culture & Society\u00a021(4-5), 261\u2013277 (2004)","journal-title":"Theory, Culture & Society"},{"issue":"2","key":"15_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jiscrm.2009040101","volume":"1","author":"M. B\u00fcscher","year":"2009","unstructured":"B\u00fcscher, M., Kristensen, M., Mogen, P.: When and How (not) to Trust IT? Supporting Virtual Emergency Teamworksen. International Journal of Information Systems for Crisis Response and Management\u00a01(2), 1\u201315 (2009)","journal-title":"International Journal of Information Systems for Crisis Response and Management"},{"key":"15_CR15","volume-title":"Scientific practice and ordinary action","author":"M. Lynch","year":"1993","unstructured":"Lynch, M.: \u2018Appendix: The linear society of traffic\u2019. In: Scientific practice and ordinary action. Cambridge University Press, Cambridge (1993)"},{"key":"15_CR16","volume-title":"Human-machine reconfigurations","author":"L. Suchman","year":"2007","unstructured":"Suchman, L.: Human-machine reconfigurations. Cambridge University Press, Cambridge (2007)"},{"issue":"3\/4","key":"15_CR17","first-page":"271","volume":"68","author":"L. Jayyusi","year":"1988","unstructured":"Jayyusi, L.: Toward a Socio-logic of the Film Text. Semiotica\u00a068(3\/4), 271\u2013296 (1988)","journal-title":"Semiotica"},{"key":"15_CR18","volume-title":"Studies in ethnomethodology","author":"H. Garfinkel","year":"1967","unstructured":"Garfinkel, H.: Studies in ethnomethodology. Polity, London (1967)"},{"key":"15_CR19","volume-title":"Ten Questions About Human Error","author":"S. Dekker","year":"2005","unstructured":"Dekker, S.: Ten Questions About Human Error. Erlbaum, Hillsdale (2005)"},{"key":"15_CR20","volume-title":"Relations in public","author":"E. Goffman","year":"1971","unstructured":"Goffman, E.: Relations in public. Harper & Row, New York (1971)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Mondada, L.: Emergent focused interactions in public places: A systematic analysis of the multimodal achievement of a common interactional space. Journal of Pragmatics (2008)","DOI":"10.1016\/j.pragma.2008.09.019"},{"key":"15_CR22","volume-title":"On phenomenology and social relations","author":"A. Schutz","year":"1970","unstructured":"Schutz, A.: On phenomenology and social relations. The University of Chicago Press, Chicago (1970)"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Engelbart, D.C.: Augmenting human intellect: A conceptual framework. Stanford Research Institute Summary report (1962)","DOI":"10.21236\/AD0289565"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Bellotti, V., Back, M., Edwards, W.K., Grinter, R.E., Henderson, A., Lopes, C.: Making sense of sensing systems: Five questions for designers and researchers. In: Terveen, L. (ed.) Proceedings of CHI 2002, pp. 415\u2013422 (2002)","DOI":"10.1145\/503376.503450"},{"key":"15_CR25","volume-title":"The concept of creativity in science and art","author":"R. Harr\u00e9","year":"1981","unstructured":"Harr\u00e9, R.: Creativity in science. In: Dutton, D., Krausz, M. (eds.) The concept of creativity in science and art. M. Nijhoff, The Hague (1981)"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Foo, S., Abdulhai, B.: Evaluating the impacts of changeable message signs on traffic diversion. In: Proceedings of IEEE Intelligent Transportation Systems Conference (ITSC 2006), pp. 891\u2013896 (2006)","DOI":"10.1109\/ITSC.2006.1706857"},{"issue":"1","key":"15_CR27","first-page":"8","volume":"5","author":"K. Cheverst","year":"2001","unstructured":"Cheverst, K., Davies, N., Mitchell, K., Efstratiou, C.: Using Context as a Crystal Ball: Rewards and Pitfalls. Personal Technologies Journal\u00a05(1), 8\u201311 (2001)","journal-title":"Personal Technologies Journal"},{"issue":"1","key":"15_CR28","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"A. Dey","year":"2001","unstructured":"Dey, A.: Understanding and using Context. Personal and Ubiquitous Computing\u00a05(1), 4\u20137 (2001)","journal-title":"Personal and Ubiquitous Computing"},{"key":"15_CR29","unstructured":"Burke, J.E., Hansen, D., Parker, M., Ramanathan, A., Reddy, N., Srivastava, S.,, M.: Participatory sensing. In: Proceedings of ACM Sensys World Sensor Web Workshop (2006)"},{"key":"15_CR30","unstructured":"Southern, J., Speed, C.: Comob (2009), http:\/\/www.comob.org.uk\/"},{"issue":"3","key":"15_CR31","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/329124.329126","volume":"3","author":"M. Weiser","year":"1999","unstructured":"Weiser, M.: The computer for the 21st century. ACM SIGMOBILE Mobile Computing and Communications Review\u00a03(3), 3\u201311 (1999)","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"15_CR32","volume-title":"Being and time","author":"M. Heidegger","year":"1962","unstructured":"Heidegger, M.: Being and time. Blackwell, London (1962)"},{"key":"15_CR33","volume-title":"Human-machine reconfigurations","author":"L. Suchman","year":"2007","unstructured":"Suchman, L.: Human-machine reconfigurations. Cambridge University Press, Cambridge (2007)"},{"key":"15_CR34","unstructured":"Chalmers, M.: Seamful Design and Pervasive computing Infrastructure. In: Proceedings of the Pervasive Computing 2003 Workshop \u2019At the Crossroads: The Interaction of HCI and Systems Issues in Pervasive computing\u2019 (2003)"},{"key":"15_CR35","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7221.001.0001","volume-title":"Where the action is: The Foundations of Embodied Interaction","author":"P. Dourish","year":"2001","unstructured":"Dourish, P.: Where the action is: The Foundations of Embodied Interaction. MIT Press, Cambridge (2001)"},{"key":"15_CR36","unstructured":"Andersen, P. (ed) PalCom Deliverable 54: Open architecture. (2007), http:\/\/www.ist-palcom.org\/publications\/deliverables\/Deliverable-54-[2.2.3]-open-architecture.pdf"},{"key":"15_CR37","unstructured":"B\u00fcscher, M., Mogensen, P.: Matereal methods. In: B\u00fcscher, M., Goodwin, D., Mesman, J. (eds.) Ethnographies of diagnostic work. Dimensions of transformative practice, Palgrave (forthcoming, 2009)"},{"issue":"1","key":"15_CR38","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing Magazine\u00a02(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing Magazine"},{"key":"15_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-540-72037-9_8","volume-title":"Pervasive Computing","author":"J. Krumm","year":"2007","unstructured":"Krumm, J.: Inference Attacks on Location Tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol.\u00a04480, pp. 127\u2013143. Springer, Heidelberg (2007)"},{"key":"15_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/11552338_13","volume-title":"Secure Data Management","author":"C. Bettini","year":"2005","unstructured":"Bettini, C., Wang, X.S., Jajodia, S.: Protecting Privacy Against Location-Based Personal Identification. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2005. LNCS, vol.\u00a03674, pp. 185\u2013199. Springer, Heidelberg (2005)"},{"key":"15_CR41","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1066116.1189037","volume-title":"First ACM\/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys 2003)","author":"M. Gruteser","year":"2003","unstructured":"Gruteser, M., Grunwald, D.: Anonymous Usage of Location\u2010Based Services Through Spatial and Temporal Cloaking. In: First ACM\/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys 2003), pp. 31\u201342. ACM Press, San Francisco (2003)"},{"key":"15_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M. Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A Formal Model of Obfuscation and Negotiation for Location Privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 152\u2013170. Springer, Heidelberg (2005)"},{"key":"15_CR43","doi-asserted-by":"crossref","unstructured":"Palen, L., Dourish, P.: Unpacking \u201cprivacy\u201d for a networked world. In: Proceedings of CHI 2003 (2003), http:\/\/www.ics.uci.edu\/~jpd\/publications\/2003\/chi2003-privacy.pdf","DOI":"10.1145\/642611.642635"},{"key":"15_CR44","doi-asserted-by":"crossref","unstructured":"De Paula, R., et al.: In the Eye of the Beholder: A Visualization-based Approach to System Security. Int. J. Human-Computer Studies\u00a0(63) 1-2, 5\u201324","DOI":"10.1016\/j.ijhcs.2005.04.021"},{"key":"15_CR45","doi-asserted-by":"crossref","unstructured":"Licoppe, C.: Recognizing mutual \u2018proximity\u2019 at a distance: Weaving together mobility, sociality and technology. Journal of Pragmatics\u00a041 (in press)","DOI":"10.1016\/j.pragma.2008.09.017"},{"key":"15_CR46","volume-title":"The Chimney of the World","author":"S. Mosley","year":"2008","unstructured":"Mosley, S.: The Chimney of the World, 2nd edn. Routledge, New York (2008)","edition":"2"},{"key":"15_CR47","doi-asserted-by":"crossref","DOI":"10.4324\/9780203946565","volume-title":"Non-representational theory","author":"N. Thrift","year":"2008","unstructured":"Thrift, N.: Movement-space: The changing domain of thinking resulting from the development of new kinds of spatial awareness. In: Non-representational theory. Routledge, London (2008)"},{"key":"15_CR48","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-0-387-77672-9_10","volume-title":"Social Computing, Behavioral Modeling, and Prediction","author":"N. Eagle","year":"2008","unstructured":"Eagle, N., Pentland, A., Lazer, D.: Mobile Phone Data for Inferring Social Network Structure. In: Liu, H., et al. (eds.) Social Computing, Behavioral Modeling, and Prediction, pp. 79\u201388. Springer, Heidelberg (2008)"},{"key":"15_CR49","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.futures.2004.10.012","volume":"37","author":"R. Ahas","year":"2005","unstructured":"Ahas, R., Mark, \u00dc.: Location Based Services \u2013 New Challenges for Planning and Public Administration. Futures\u00a037, 547\u2013561 (2005)","journal-title":"Futures"},{"volume-title":"European Living Labs. A new approach for human centric regional innovation","year":"2008","key":"15_CR50","unstructured":"Schumacher, J., Niitamo, V.P. (eds.): European Living Labs. A new approach for human centric regional innovation. Wissenschaftlicher Verlag, Berlin (2008)"},{"key":"15_CR51","volume-title":"Second Person","author":"J. McGonigal","year":"2006","unstructured":"McGonigal, J.: The puppetmaster problem: Design for real world, mission based gaming. In: Harrigan, P., Wardrip-Fruin, N. (eds.) Second Person. MIT Press, Cambridge (2006)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Communications Infrastructure. Systems and Applications in Europe"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11284-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,24]],"date-time":"2020-05-24T06:11:53Z","timestamp":1590300713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11284-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642112836","9783642112843"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11284-3_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}