{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T14:36:51Z","timestamp":1776091011749,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662480502","type":"print"},{"value":"9783662480519","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-48051-9_20","type":"book-chapter","created":{"date-parts":[[2015,9,4]],"date-time":"2015-09-04T13:44:22Z","timestamp":1441374262000},"page":"274-280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing"],"prefix":"10.1007","author":[{"given":"Katharina","family":"Krombholz","sequence":"first","affiliation":[]},{"given":"Adrian","family":"Dabrowski","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,5]]},"reference":[{"key":"20_CR1","unstructured":"Google Glass targeted as symbol by anti-tech crowd. http:\/\/edition.cnn.com\/2014\/04\/14\/tech\/mobile\/google-glass-attack\/. Accessed 10 July 2014"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1007\/978-3-642-21827-9_52","volume-title":"Modern Approaches in Applied Intelligence","author":"MS Barhm","year":"2011","unstructured":"Barhm, M.S., Qwasmi, N., Qureshi, F.Z., el-Khatib, K.: Negotiating privacy preferences in video surveillance systems. In: Mehrotra, K.G., Mohan, C.K., Oh, J.C., Varshney, P.K., Ali, M. (eds.) IEA\/AIE 2011, Part II. LNCS, vol. 6704, pp. 511\u2013521. Springer, Heidelberg (2011)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Weippl, E.R., Echizen, I.: Framework based on privacy policy hiding for preventing unauthorized face image processing. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 455\u2013461. IEEE (2013)","DOI":"10.1109\/SMC.2013.83"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Denning, T., Dehlawi, Z., Kohno, T.: In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, pp. 2377\u20132386. ACM (2014)","DOI":"10.1145\/2556288.2557352"},{"key":"20_CR5","unstructured":"Harvey, A.: CV Dazzle, 2010\u20132012. http:\/\/cvdazzle.com\/. Accessed 10 April 2014"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Henne, B., Szongott, C., Smith, M.: Snapme if you can: privacy threats of other peoples\u2019 geo-tagged media and what we can do about it. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 95\u2013106. ACM (2013)","DOI":"10.1145\/2462096.2462113"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Pallas, F., Ulbricht, M.-R., Jaume-Palas\u00ed, L., H\u00f6ppner, U.: Offlinetags: a novel privacy approach to online photo sharing. In: CHI 2014 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2014, pp. 2179\u20132184. ACM, New York (2014)","DOI":"10.1145\/2559206.2581195"},{"key":"20_CR8","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/978-1-84882-301-3_11","volume-title":"Protecting Privacy in Video Surveillance","author":"SN Patel","year":"2009","unstructured":"Patel, S.N., Summet, J.W., Truong, K.N.: Blindspot: creating capture-resistant spaces. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 185\u2013201. Springer, Heidelberg (2009)"},{"key":"20_CR9","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-1-84882-301-3_5","volume-title":"Protecting Privacy in Video Surveillance","author":"J Schiff","year":"2009","unstructured":"Schiff, J., Meingast, M., Mulligan, D.K., Sastry, S., Goldberg, K.: Respectful cameras: detecting visual markers in real-time to address privacy concerns. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 65\u201389. Springer, Heidelberg (2009)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Templeman, R., Korayem, M., Crandall, D., Kapadia, A.: Placeavoider: steering first-person cameras away from sensitive spaces. In: Network and Distributed System Security Symposium (NDSS) (2014)","DOI":"10.14722\/ndss.2014.23014"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Yamada, T., Gohshi, S., Echizen, I.: Use of invisible noise signals to prevent privacy invasion through face recognition from camera images. In: Proceedings of the 20th ACM International Conference on Multimedia, MM 2012, pp. 1315\u20131316. ACM, New York (2012)","DOI":"10.1145\/2393347.2396460"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/978-3-642-40779-6_13","volume-title":"Communications and Multimedia Security","author":"T Yamada","year":"2013","unstructured":"Yamada, T., Gohshi, S., Echizen, I.: Privacy visor: method for preventing face image detection by using differences in human and device sensitivity. In: De Decker, B., Dittmann, J., Kraetzer, C., Vielhauer, C. (eds.) CMS 2013. LNCS, vol. 8099, pp. 152\u2013161. Springer, Heidelberg (2013)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Yus, R., Pappachan, P., Das, P.K., Mena, E., Joshi, A., Finin, T.: Demo: faceblock: privacy-aware pictures for google glass. In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, pp. 366\u2013366. ACM (2014)","DOI":"10.1145\/2594368.2601473"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-48051-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T19:53:19Z","timestamp":1674244399000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-48051-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662480502","9783662480519"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-48051-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"5 September 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}