{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:16:18Z","timestamp":1725567378379},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642163913"},{"type":"electronic","value":"9783642163920"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16392-0_6","type":"book-chapter","created":{"date-parts":[[2010,10,7]],"date-time":"2010-10-07T08:09:42Z","timestamp":1286438982000},"page":"90-107","source":"Crossref","is-referenced-by-count":0,"title":["A Human-Centric Perspective on Ubiquitous Knowledge Discovery"],"prefix":"10.1007","author":[{"given":"Bettina","family":"Berendt","sequence":"first","affiliation":[]},{"given":"Ernestina","family":"Menasalvas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Chapman, P., Clinton, J., Kerber, R., Khabaza, T., Reinartz, T., Shearer, C., Wirth, R.: CRISP 1.0 process and user guide (2000), http:\/\/www.crisp-dm.org\/download.htm"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"van Lamsweerde, A.: Requirements engineering in the year 00: a research perspective. In: International Conference on Software Engineering, pp. 5\u201319 (2000)","DOI":"10.1145\/337180.337184"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1023\/A:1018946223345","volume":"3","author":"I. Sommerville","year":"1997","unstructured":"Sommerville, I., Sawyer, P.: Viewpoints: Principles, problems and a practical approach to requirements engineering. Annals of Software Engineering\u00a03, 101\u2013130 (1997)","journal-title":"Annals of Software Engineering"},{"key":"6_CR4","unstructured":"G\u00fcrses, S., Berendt, B., Santen, T.: Multilateral security requirements analysis for preserving privacy in ubiquitous environments. In: Proceedings of the Workshop on Ubiquitous Knowledge Discovery for Users at ECML\/PKDD 2006, Berlin, pp. 51\u201364 (2006), http:\/\/vasarely.wiwi.hu-berlin.de\/UKDU06\/Proceedings\/UKDU06-proceedings%.pdf"},{"key":"6_CR5","unstructured":"Preibusch, S., Hoser, B., G\u00fcrses, S., Berendt, B.: Ubiquitous social networks \u2013 opportunities and challenges for privacy-aware user modelling. In: Proceedings of the Workshop on Data Mining for User Modelling at UM 2007 (2007), http:\/\/vasarely.wiwi.hu-berlin.de\/DM.UM07\/Proceedings\/DM.UM07-proceedin%gs.pdf"},{"issue":"2","key":"6_CR6","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF01099429","volume":"4","author":"J. Orwant","year":"1995","unstructured":"Orwant, J.: Heterogenous learning in the doppelg\u00e4nger user modeling system. User Modeling and User-Adapted Interaction\u00a04(2), 107\u2013130 (1995)","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Pierrakos, D., Paliouras, G., Papatheodorou, C., Karkaletsis, V., Dikaiakos, M.D.: Web community directories: A new approach to web personalization. In: EWMF, pp. 113\u2013129 (2003)","DOI":"10.1007\/978-3-540-30123-3_7"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Jameson, A.: More than the sum of its members: Challenges for group recommender systems. In: Proceedings of the International Working Conference on Advanced Visual Interfaces, Gallipoli, Italy, pp. 48\u201354 (2004), http:\/\/dfki.de\/~jameson\/abs\/Jameson04AVI.html","DOI":"10.1145\/989863.989869"},{"key":"6_CR9","unstructured":"Easterbrook, S.: Resolving requirements conflicts with computer-supported negotiation. Requirements Engineering: Social and Technical Issues, 41\u201365 (1994)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Boehm, B., Bose, P., Horowitz, E., Lee, M.J.: Software requirements negotiation and renegotiation aids. In: ICSE 1995: Proceedings of the 17th International Conference on Software Engineering, pp. 243\u2013253 (1995)","DOI":"10.1145\/225014.225037"},{"issue":"4","key":"6_CR11","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1145\/158431.158438","volume":"2","author":"P. Zave","year":"1993","unstructured":"Zave, P., Jackson, M.: Conjunction as composition. ACM Trans. Softw. Eng. Methodol.\u00a02(4), 379\u2013411 (1993)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Robinson, W.N.: Integrating multiple specifications using domain goals. In: IWSSD 1989: Proceedings of the 5th International Workshop on Software Specification and Design, pp. 219\u2013226 (1989)","DOI":"10.1145\/75199.75232"},{"key":"6_CR13","unstructured":"EU: Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data. Official Journal of the European Communities (L. 281) (1995), http:\/\/europa.eu.int\/eur-lex\/en\/consleg\/main\/1995\/en_1995L0046_index.html"},{"issue":"6","key":"6_CR14","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1177\/146144804042523","volume":"6","author":"D. Phillips","year":"2004","unstructured":"Phillips, D.: Privacy policy and PETs: The influence of policy regimes on the development and social implications of privacy enhancing technologies. New Media Society\u00a06(6), 691\u2013706 (2004)","journal-title":"New Media Society"},{"key":"6_CR15","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/11740674_3","volume-title":"Modeling and Retrieval of Context","author":"D. Heckmann","year":"2006","unstructured":"Heckmann, D.: Situation modeling and smart context retrieval with semantic web technology and conflict resolution. In: Roth-Berghofer, T.R., Schulz, S., Leake, D.B. (eds.) MRC 2005. LNCS (LNAI), vol.\u00a03946, pp. 34\u201347. Springer, Heidelberg (2006)"},{"key":"6_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-540-74951-6_6","volume-title":"From Web to Social Web: Discovering and Deploying User and Content Profiles","author":"B. Berendt","year":"2007","unstructured":"Berendt, B., Kralisch, A.: From world-wide-web mining to worldwide webmining: Understanding people\u2019s diversity for effective knowledge discovery. In: Berendt, B., Hotho, A., Mladeni\u010d, D., Semeraro, G. (eds.) WebMine 2007. LNCS (LNAI), vol.\u00a04737, pp. 102\u2013121. Springer, Heidelberg (2007)"},{"key":"6_CR17","volume-title":"Cultures and Organizations: Software of the Mind","author":"G. Hofstede","year":"1991","unstructured":"Hofstede, G.: Cultures and Organizations: Software of the Mind. McGraw-Hill, New York (1991)"},{"issue":"1","key":"6_CR18","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"A.K. Dey","year":"2001","unstructured":"Dey, A.K.: Understanding and using context. Personal and Ubiquitous Computing\u00a05(1), 4\u20137 (2001)","journal-title":"Personal and Ubiquitous Computing"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/978-3-642-83230-7_1","volume-title":"User Models in Dialog Systems","author":"W. Wahlster","year":"1989","unstructured":"Wahlster, W., Kobsa, A.: User models in dialog systems. In: Kobsa, A., Wahlster, W. (eds.) User Models in Dialog Systems, pp. 4\u201334. Springer, Heidelberg (1989)"},{"issue":"3&4","key":"6_CR20","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1147\/sj.393.0617","volume":"39","author":"H. Lieberman","year":"2000","unstructured":"Lieberman, H., Selker, T.: Out of context: Computer systems that adapt to, and learn from, context. IBM Systems Journal\u00a039(3&4), 617 (2000)","journal-title":"IBM Systems Journal"},{"key":"6_CR21","unstructured":"Schmidt, A.: Potentials and challenges of context-awareness for learning solutions. In: Proc. LWA, pp. 63\u201368 (2005)"},{"key":"6_CR22","unstructured":"Kray, C.: Situated interaction on spatial topics. Dissertations in Artificial Intelligence-Infix, vol.\u00a0274 (November 2003)"},{"key":"6_CR23","first-page":"305","volume-title":"Human-Computer Interaction Handbook","author":"A. Jameson","year":"2003","unstructured":"Jameson, A.: Adaptive interfaces and agents. In: Jacko, J.A., Sears, A. (eds.) Human-Computer Interaction Handbook, pp. 305\u2013330. Erlbaum, Mahwah (2003), http:\/\/dfki.de\/~jameson\/abs\/Jameson03Handbook.html"},{"key":"6_CR24","unstructured":"Wikipedia: Context awareness (2006), http:\/\/en.wikipedia.org\/wiki\/Context_awareness (access date November 21, 2006)"},{"key":"6_CR25","unstructured":"Cheverst, K., Smith, G.: Exploring the notion of information push and pull with respect to the user intention and disruption. In: International Workshop on Distributed and Disappearing User Interfaces in Ubiquitous Computing, pp. 67\u201372 (2001)"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Benford, S., Fahl\u00e9n, L.E.: A spatial model of interaction in large virtual environments. In: ECSCW, p. 107 (1993)","DOI":"10.1007\/978-94-011-2094-4_8"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-39653-6_12","volume-title":"UbiComp 2003: Ubiquitous Computing","author":"L. Barkhuus","year":"2003","unstructured":"Barkhuus, L., Dey, A.: Is context-aware computing taking control away from the user? three levels of interactivity examined. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol.\u00a02864, pp. 149\u2013156. Springer, Heidelberg (2003)"},{"issue":"2-3","key":"6_CR28","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s00779-005-0022-y","volume":"4","author":"A. Schmidt","year":"2006","unstructured":"Schmidt, A.: Implicit human computer interaction through context. Personal and Ubiquitous Computing\u00a04(2-3), 191\u2013199 (2006)","journal-title":"Personal and Ubiquitous Computing"},{"key":"6_CR29","unstructured":"f\u00fcr Datenschutz Schleswig-Holstein und Institut f\u00fcr Wirtschaftsinformatik der Humboldt-Universit\u00e4t\u00a0zu Berlin, U.L.: TAUCIS \u2013 Technikfolgen-Absch\u00e4tzung Ubiquit\u00e4res Computing und Informationelle Selbstbestimmung (2006), http:\/\/www.datenschutzzentrum.de\/taucis\/index.htm"},{"key":"6_CR30","volume-title":"Situations and Attitudes","author":"J. Barwise","year":"1983","unstructured":"Barwise, J.: Situations and Attitudes. MIT-Bradford, Cambridge (1983)"},{"key":"6_CR31","first-page":"266","volume":"1","author":"D. Heckmann","year":"2005","unstructured":"Heckmann, D.: Distributed user modeling for situated interaction. GI Jahrestagung\u00a0(1), 266\u2013270 (2005)","journal-title":"GI Jahrestagung"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Heckmann, D., Schwartz, T., Brandherm, B., Schmitz, M., von Wilamowitz-Moellendorff, M.: Gumo - the general user model ontology. In: User Modeling, pp. 428\u2013432 (2005)","DOI":"10.1007\/11527886_58"},{"key":"6_CR33","first-page":"298","volume-title":"Innovative Concepts for Agent-Based Systems","author":"J.J. Bryson","year":"2003","unstructured":"Bryson, J.J.: Where should complexity go? Cooperation in complex agents with minimal communication. In: Truszkowski, W., Rouff, C., Hinchey, M. (eds.) Innovative Concepts for Agent-Based Systems, pp. 298\u2013313. Springer, Heidelberg (2003)"},{"key":"6_CR34","first-page":"1115","volume-title":"Proceedings of the 17th International Joint Conference on Artificial Intelligence, Seattle","author":"J.J. Bryson","year":"2001","unstructured":"Bryson, J.J., Stein, L.A.: Modularity and design in reactive intelligence. In: Proceedings of the 17th International Joint Conference on Artificial Intelligence, Seattle, pp. 1115\u20131120. Morgan Kaufmann, San Francisco (2001)"},{"key":"6_CR35","unstructured":"Weibelzahl, S.: Evaluation of adaptive systems, phd disertation (2003)"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16392-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T04:56:23Z","timestamp":1559710583000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16392-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642163913","9783642163920"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16392-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}