{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:59:26Z","timestamp":1743098366168,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279157"},{"type":"electronic","value":"9783642279164"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27916-4_18","type":"book-chapter","created":{"date-parts":[[2012,2,10]],"date-time":"2012-02-10T00:10:18Z","timestamp":1328832618000},"page":"156-163","source":"Crossref","is-referenced-by-count":0,"title":["A Conceptual Framework for Enabling Community-Driven Extensible, Open and Privacy-Preserving Ubiquitous Computing Networks"],"prefix":"10.1007","author":[{"given":"Tomas","family":"Lind\u00e9n","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Langheinrich, M.: Privacy in Ubiquitous Computing. In: Krumm, J. (ed.) Ubiquitous Computing Fundamentals, 1st edn. Chapman & Hall\/CRC (2010)","DOI":"10.1201\/9781420093612.ch3"},{"key":"18_CR2","first-page":"967","volume":"53","author":"D.J. Solove","year":"2003","unstructured":"Solove, D.J.: The Virtues of Knowing Less: Justifying Privacy Protections Against Disclosure. Duke Law Journal\u00a053, 967 (2003)","journal-title":"Duke Law Journal"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Weiser, M.: The Computer for the 21st Century- Scientific American Special Issue on Communications, Computers, and Networks (September 1991)","DOI":"10.1038\/scientificamerican0991-94"},{"issue":"2","key":"18_CR4","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/170036.170072","volume":"22","author":"R. Agrawal","year":"1993","unstructured":"Agrawal, R., Imieli\u0144ski, T., Swami, A.: Mining association rules between sets of items in large databases. SIGMOD Rec.\u00a022(2), 207\u2013216 (1993), doi:10.1145\/170036.170072","journal-title":"SIGMOD Rec."},{"key":"18_CR5","unstructured":"Taipale, K.A.: Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data. Columbia Science and Technology Law Review\u00a05(2) (December 2003)"},{"key":"18_CR6","unstructured":"Cranor, L.F., Reagle, J., Ackerman, M.S.: Beyond concern: Understanding net users\u2019 attitudes about online privacy. Technical Report TR 99.4.3, AT&T Labs-Research (April 1999)"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/974121.974131","volume":"33","author":"V.S. Verykios","year":"2004","unstructured":"Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. SIGMOD Rec.\u00a033(1), 50\u201357 (2004)","journal-title":"SIGMOD Rec."},{"key":"18_CR8","volume-title":"Free Software, Free Society: Selected Essays of Richard M. Stallman","author":"R.M. Stallman","year":"2010","unstructured":"Stallman, R.M.: Free Software, Free Society: Selected Essays of Richard M. Stallman, 2nd edn. GNU Press, Boston (2010); ISBN 978-0-9831592-0-9","edition":"2"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"von Hippel, E.: Democratizing Innovation. MIT Press (2005)","DOI":"10.7551\/mitpress\/2333.001.0001"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Ojala, T., Kukka, H., Lind\u00e9n, T., Heikkinen, T., Jurmu, M., Hosio, S., Kruger, F.: UBI-Hotspot 1.0: Large-Scale Long-Term Deployment of Interactive Public Displays in a City Center. In: Fifth International Conference on Internet and Web Applications and Services (ICIW), pp. 285\u2013294 (2010)","DOI":"10.1109\/ICIW.2010.49"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27916-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:38:24Z","timestamp":1558298304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27916-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279157","9783642279164"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27916-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}