{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:56:12Z","timestamp":1742918172741,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642287640"},{"type":"electronic","value":"9783642287657"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28765-7_51","type":"book-chapter","created":{"date-parts":[[2012,3,23]],"date-time":"2012-03-23T09:50:43Z","timestamp":1332496243000},"page":"429-436","source":"Crossref","is-referenced-by-count":3,"title":["Intelligent Working Environments, Handling of Medical Data and the Ethics of Human Resources"],"prefix":"10.1007","author":[{"given":"C\u00e9line Ehrwein","family":"Nihan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"51_CR1","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1016\/j.intcom.2004.08.001","volume":"16","author":"J. Allanson","year":"2004","unstructured":"Allanson, J., Fairclough, S.H.: A research agenda for physiological computing. Interacting with Computer\u00a016, 857\u2013878 (2004)","journal-title":"Interacting with Computer"},{"key":"51_CR2","volume-title":"The Human Condition","author":"H. Arendt","year":"1958","unstructured":"Arendt, H.: The Human Condition. The University of Chicago Press, Chicago (1958)"},{"key":"51_CR3","first-page":"143","volume-title":"Universal Access in HCI, Part II","author":"C. B\u00fchler","year":"2009","unstructured":"B\u00fchler, C.: Ambient intelligence in working environments. In: Stephanidis, C. (ed.) Universal Access in HCI, Part II, pp. 143\u2013149. Springer, Heidelberg (2009)"},{"issue":"5","key":"51_CR4","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1080\/10807030490513793","volume":"10","author":"J. Bohn","year":"2004","unstructured":"Bohn, J., et al.: Living in a world of smart everyday objects \u2013 social, economic, and ethical implications. Journal of Human and Ecological Risk Assessment\u00a010(5), 763\u2013786 (2004)","journal-title":"Journal of Human and Ecological Risk Assessment"},{"unstructured":"Foucault, M.: Surveiller et punir. Naissance de la prison. Gallimard, Paris (1975)","key":"51_CR5"},{"key":"51_CR6","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s10676-009-9198-6","volume":"12","author":"O.H. Gandy Jr.","year":"2010","unstructured":"Gandy Jr., O.H.: Engaging rational discrimination: exploring reasons for placing regulatory constraints on decision support systems. Ethics Inf. Technol.\u00a012, 29\u201342 (2010)","journal-title":"Ethics Inf. Technol."},{"key":"51_CR7","volume-title":"Justification and application: remarks on discourse ethics","author":"J. Habermas","year":"1994","unstructured":"Habermas, J.: Justification and application: remarks on discourse ethics. MIT Press, Cambridge (1994); Original German version (1991)"},{"key":"51_CR8","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s11572-007-9042-1","volume":"2","author":"M. Hildebrandt","year":"2008","unstructured":"Hildebrandt, M.: Ambient intelligence, criminal liability and democracy. Crim. Law and Philos.\u00a02, 163\u2013180 (2008)","journal-title":"Crim. Law and Philos."},{"doi-asserted-by":"crossref","unstructured":"Kaptein, M.C., et al.: Persuasion in ambient intelligence. Journal of Ambient Intelligence and Humanized Computing (2010), doi:10.1007\/s12652-009-0005-3","key":"51_CR9","DOI":"10.1007\/s12652-009-0005-3"},{"issue":"2","key":"51_CR10","first-page":"9","volume":"4","author":"D. Ronzani","year":"2009","unstructured":"Ronzani, D.: The battle of concepts: Ubiquitous computing, pervasive computing and ambient intelligence in mass media. UbiCC Journal\u00a04(2), 9\u201319 (2009)","journal-title":"UbiCC Journal"},{"unstructured":"Schuurman, J.G., et al.: Ambient intelligence. Viable future or dangerous illusion? Rathenau Instituut (2009), \n                    http:\/\/www.rathenau.nl\/uploads\/tx_tferathenau\/Ambient_Intelligence_ENG.pdf\n                   (accessed October 03, 2011)","key":"51_CR11"},{"doi-asserted-by":"crossref","unstructured":"Spiekermann, S., Pallas, F.: Technology paternalism \u2013 wider implications of ubiquitous computing. Poiesis and Praxis (2006), doi: 10.1007\/s10202-005-0010","key":"51_CR12","DOI":"10.1007\/s10202-005-0010-3"},{"key":"51_CR13","first-page":"708","volume-title":"Universal Access in HCI, Part II","author":"O. Stefani","year":"2007","unstructured":"Stefani, O., et al.: Ambient intelligence in working environments. In: Stephanidis, C. (ed.) Universal Access in HCI, Part II, pp. 708\u2013714. Springer, Heidelberg (2007)"},{"key":"51_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/11755494_21","volume-title":"Persuasive Technology","author":"E.L. van den Broek","year":"2006","unstructured":"van den Broek, E.L., Schut, M.H., Tuinenbreijer, K., Westerink, J.H.D.M.: Communication and Persuasion Technology: Psychophysiology of Emotions and User-Profiling. In: IJsselsteijn, W.A., de Kort, Y.A.W., Midden, C., Eggen, B., van den Hoven, E. (eds.) PERSUASIVE 2006. LNCS, vol.\u00a03962, pp. 154\u2013157. Springer, Heidelberg (2006)"},{"issue":"4","key":"51_CR15","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1147\/sj.384.0693","volume":"38","author":"M. Weiser","year":"1999","unstructured":"Weiser, M., Gold, R., Brown, J.S.: The origins of ubiquitous computing research at PARC in the Late 1980s. IBM System Journal\u00a038(4), 693\u2013696 (1999)","journal-title":"IBM System Journal"},{"doi-asserted-by":"crossref","unstructured":"Wieland, M., et al.: Methods for conserving privacy in workflow controlled smart environments \u2013 A technical and philosophical enquiry into human-oriented system design of ubiquitous work environments. In: Proceedings of the The Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies (2009), doi: 10.1109\/UBICOMM.2009.44","key":"51_CR16","DOI":"10.1109\/UBICOMM.2009.44"}],"container-title":["Advances in Intelligent and Soft Computing","Distributed Computing and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28765-7_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T00:24:53Z","timestamp":1676766293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-28765-7_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642287640","9783642287657"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28765-7_51","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2012]]}}}