{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:57:19Z","timestamp":1725897439442},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642126062"},{"type":"electronic","value":"9783642126079"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12607-9_21","type":"book-chapter","created":{"date-parts":[[2010,6,7]],"date-time":"2010-06-07T11:07:27Z","timestamp":1275908847000},"page":"326-330","source":"Crossref","is-referenced-by-count":3,"title":["Study of Usability of Security and Privacy in Context Aware Mobile Applications"],"prefix":"10.1007","author":[{"given":"Neha","family":"Pattan","sequence":"first","affiliation":[]},{"given":"Deepthi","family":"Madamanchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Schilit, B., Adams, N., Want, R.: Context Aware Computing Applications. In: Proceedings of Workshop on Mobile Computing Systems and Applications, December 8-9, pp. 85\u201390 (1994)","key":"21_CR1","DOI":"10.1109\/WMCSA.1994.16"},{"unstructured":"Nokia Friend View Application, Nokia Beta Labs, \n                    \n                      http:\/\/betalabs.nokia.com\/betas\/view\/nokia-friend-view","key":"21_CR2"},{"unstructured":"Chen, G., Kotz, D.: A Survey of Context Aware Mobile Computing Research. Dartmouth Computer Science Technical Report (2000)","key":"21_CR3"},{"unstructured":"Iachello, G., Smith, I., Consolvo, S., Chen, M., Abowd, G.: Developing Privacy Guidelines for Social Location Disclosure Applications and Services. In: Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems, pp. 229\u2013238 (2008)","key":"21_CR4"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","first-page":"150","volume-title":"UbiComp 2003: Ubiquitous Computing","author":"L. Barkhuus","year":"2003","unstructured":"Barkhuus, L., Anind, D.: Is Context-Aware Computing Taking Control Away from the User? Three Levels of Iteractivity Examined. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol.\u00a02864, pp. 150\u2013156. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Computing, Applications, and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12607-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T05:24:21Z","timestamp":1552541061000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12607-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642126062","9783642126079"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12607-9_21","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}