{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T06:10:01Z","timestamp":1746425401911,"version":"3.40.4"},"publisher-location":"Wiesbaden","reference-count":23,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658067076"},{"type":"electronic","value":"9783658067083"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-658-06708-3_18","type":"book-chapter","created":{"date-parts":[[2014,10,17]],"date-time":"2014-10-17T06:50:27Z","timestamp":1413528627000},"page":"220-229","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enforcing Data Privacy in the Age of Google Glass"],"prefix":"10.1007","author":[{"given":"Christian","family":"Thiel","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Thiel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,18]]},"reference":[{"key":"18_CR49","doi-asserted-by":"crossref","unstructured":"[AbDB99] G.D. Abowd, A.K. Day, P.J. Brown: Towards a better understanding of context and context- awareness\u201d. In Handheld and ubiquitous computing. Springer, 1999, pp. 304\u2013307","DOI":"10.1007\/3-540-48157-5_29"},{"key":"18_CR50","doi-asserted-by":"crossref","unstructured":"[BDE+08] M. Blount, J. Davis, M. Ebling, W. Jerome, B. Leiba, Xuan Liu, A. Misra: Privacy engine for context-aware enterprise application services. Iin Embedded and Ubiquitous Computing, 2008. EUC\u201908. IEEE\/IFIP International Conference on, vol. 2. IEEE, 2008, pp. 94\u2013100.","DOI":"10.1109\/EUC.2008.130"},{"key":"18_CR51","unstructured":"[BHV+12] W. Bokhove, B. Hulsebosch, B. Van Schoonhoven, M. Sappelli, and K. Wouters: User privacy in applications for well-being and wellworking. In AMBIENT 2012, The Second International Conference on Ambient Computing, Applications, Services and Technologies, 2012, pp. 53\u201359."},{"key":"18_CR52","unstructured":"[BKS+01] K. Bohrer, X. Liu, D. Kesdogan, E. Schonberg, M. Singh and S. L. Spraragen: Personal Information Management and Distribution. In: The Fourth International Conference on Electronic Commerce Research (ICECR-4), Dallas, 2001"},{"key":"18_CR53","doi-asserted-by":"crossref","unstructured":"[BuNP10] L. Bussard, G. Neven, F.-S. Preiss: Downstream Usage Control. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2010), Washington, 2010","DOI":"10.1109\/POLICY.2010.17"},{"key":"18_CR54","doi-asserted-by":"crossref","unstructured":"[GhJFJ12] Dibyajyoti Ghosh, Anupam Joshi, Tim Finin and Pramod Jagtap: Privacy control in smart phones using semantically. In: Security and Privacy Workshops (SPW), 2012 IEEE Symposium on, 2012","DOI":"10.1109\/SPW.2012.27"},{"key":"18_CR55","unstructured":"[HeBo00] H. Res and J. Borking: Privacy Enhancing Technologies: The Path to Anonymity. In Registratiekamer The Netherlands VolumeII, August 1995."},{"key":"18_CR56","doi-asserted-by":"crossref","unstructured":"[Hust10] Peter Hustinx: Privacy by design: delivering the promises. Identity in the Information Society, Volume 3, Issue 2, August 2010, pp 253-255,","DOI":"10.1007\/s12394-010-0061-z"},{"key":"18_CR57","unstructured":"[InIn03] Stephen S. Intille and Amy M. Intille: New Challenges for Privacy Law: Wearable Computers that Create Electronic Digital Diaries. MIT House_n Technical Report. September 15, 2003"},{"key":"18_CR58","doi-asserted-by":"crossref","unstructured":"[Levin97] R. Levinson: The planning and execution assistant and trainer (PEAT). The Journal of Head Trauma Rehabilitation, 1997","DOI":"10.1097\/00001199-199704000-00010"},{"key":"18_CR59","unstructured":"[Mann12] Steve Mann: Wearable Computing. In: The Encyclopedia of Human-Computer Interaction, 2 nded. Editor: Mads Soegaard and Rikke Friis Dam, 2012, http:\/\/www.interactiondesign.org\/encyclopedia\/wearable_computing.html"},{"key":"18_CR60","unstructured":"[Math14] Roland Mathys: Legal Challenges of Wearable Computing. Conference paper ITechLaw World Conference, 15. Mai 2014"},{"key":"18_CR61","unstructured":"[McPo02] C. E. McCarthy and M. E. Pollack: A plan-based personalized cognitive orthotic. In Proceedings of the Sixth International Conference on Artificial Intelligence Planning Systems, M. Ghallab, J. Hertzberg, and P. Traverso, Eds.: AAAI Press, 2002, pp. 243-252."},{"key":"18_CR62","doi-asserted-by":"crossref","unstructured":"[PGDS06] A. Pentland, J. Gips, W. Dong, W. Stoltzman: Human Computing for Interactive Digital Media. In: MULTIMEDIA \u201906 Proceedings of the 14th Annual ACM International Conference on Multimedia, New York, 2006","DOI":"10.1145\/1180639.1180830"},{"key":"18_CR63","doi-asserted-by":"crossref","unstructured":"[SaEN05] V. Sacramento, M. Endler, and F. N. Nascimento: A privacy service for context-aware mobile computing. In Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First International Conference on. IEEE, 2005, pp. 182\u2013193.","DOI":"10.1109\/SECURECOMM.2005.8"},{"key":"18_CR64","unstructured":"[SaSt14] Riccardo Satta and Pasquale Stirparo: On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts. In 9th International Conference on Computer Vision Theory and Applications (VISAPP), 2014)"},{"key":"18_CR65","unstructured":"[Stati14] Statista: Google Glass annual sales forecast from 2014 to 2018. 2 May 2014 http:\/\/www.statista.com\/statistics\/259348\/google-glassannual-sales-forecast\/"},{"key":"18_CR66","doi-asserted-by":"crossref","unstructured":"[WaBr90] Warren, Samuel, Brandeis, Louis: The right to privacy. Harvard Law Review, 1890","DOI":"10.2307\/1321160"},{"key":"18_CR67","unstructured":"[Welc14] Peter Welchering: Das Stromnetz verr\u00e4t nicht nur Kriminelle. In F.A.Z. Frankfurter Allgemeine Zeitung Online-Archiv, Seiten\u00fcberschrift: Technik und Motor Ressort: Techn 01.07.2014"},{"key":"18_CR68","unstructured":"[West70] A. Westin: Privacy and freedom. New York: Atheneum, 1970"},{"key":"18_CR69","doi-asserted-by":"crossref","unstructured":"[Whit04] J. Whitman: The two western cultures of privacy: Dignity v liberty, Yale Law Journal, Volume 113 Issue 1151 Page 1161, 2004","DOI":"10.2307\/4135723"},{"key":"18_CR70","doi-asserted-by":"crossref","unstructured":"[WiHI07] R. Wishart, K. Henricksen, and J. Indulska: Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system. In Ubiquitous Intelligence and Computing. Springer, 2007, pp. 929\u2013940.","DOI":"10.1007\/978-3-540-73549-6_91"},{"key":"18_CR71","unstructured":"[YouG13] YouGov: Would you feel comfortable interacting with someone wearing Google Glasses? http:\/\/www.statista.com\/statistics\/259368\/likelihood-ofbuying-and-wearing-google-glasses\/, 2 May 2013"}],"container-title":["ISSE 2014 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-06708-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T05:42:57Z","timestamp":1746423777000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-06708-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783658067076","9783658067083"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-06708-3_18","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}