{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T14:26:54Z","timestamp":1769178414815,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,8,2]],"date-time":"2016-08-02T00:00:00Z","timestamp":1470096000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s00779-016-0939-3","type":"journal-article","created":{"date-parts":[[2016,8,2]],"date-time":"2016-08-02T05:21:30Z","timestamp":1470115290000},"page":"947-957","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Enabling the new economic actor: data protection, the digital economy, and the Databox"],"prefix":"10.1007","volume":"20","author":[{"given":"Andy","family":"Crabtree","sequence":"first","affiliation":[]},{"given":"Tom","family":"Lodge","sequence":"additional","affiliation":[]},{"given":"James","family":"Colley","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Greenhalgh","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Mortier","sequence":"additional","affiliation":[]},{"given":"Hamed","family":"Haddadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,2]]},"reference":[{"key":"939_CR1","volume-title":"Open data: unlocking innovation and performance with liquid information","author":"J Manyika","year":"2013","unstructured":"Manyika J, Chui M, Groves P, Farrell D, van Kuiken S, Almasi Doshi E (2013) Open data: unlocking innovation and performance with liquid information. McKinsey and Company, New York"},{"key":"939_CR2","volume-title":"Forecast: the internet of things worldwide","author":"P Middleton","year":"2013","unstructured":"Middleton P, Kjeldsen P, Tully J (2013) Forecast: the internet of things worldwide. Gartner, Stamford"},{"key":"939_CR3","doi-asserted-by":"crossref","unstructured":"Gates C, Matthews P (2014) Data is the new currency. In: Proc. of new security paradigms workshop. ACM, Victoria, pp 105\u2013116","DOI":"10.1145\/2683467.2683477"},{"key":"939_CR4","unstructured":"World Economic Forum (2014) Rethinking personal data: a new lens for strengthening trust. http:\/\/www3.weforum.org\/docs\/WEF_RethinkingPersonalData_ANewLens_Report_2014.pdf . Accessed 12 Feb 2016"},{"key":"939_CR5","unstructured":"Gov.UK (2015) Data protection. http:\/\/www.gov.uk\/data-protection\/the-data-protection-act . Accessed 12 Feb 2016"},{"key":"939_CR6","first-page":"611","volume-title":"Encyclopedia of law and society: American and global perspectives","author":"V Ferrari","year":"2007","unstructured":"Ferrari V (2007) Functions of law. In: Clark D (ed) Encyclopedia of law and society: American and global perspectives. Sage, New York, pp 611\u2013617"},{"key":"939_CR7","unstructured":"van Rijmenam M (2015) From data ownership to data usage: how consumers will monetise their personal data. https:\/\/datafloq.com\/read\/data-ownership-data-usage-consumers-monetize-data\/68 . Accessed 12 Feb 16"},{"key":"939_CR8","unstructured":"BCG (2012) The value of our digital identity. Liberty global"},{"key":"939_CR9","unstructured":"EU (2012) General data protection regulation. http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=COM:2012:0011:FIN:en:PDF . Accessed 12 Feb 2016"},{"key":"939_CR10","unstructured":"US (2012) Consumer data privacy in a networked world. https:\/\/www.whitehouse.gov\/sites\/default\/files\/privacy-final.pdf . Accessed 12 Feb 2016"},{"key":"939_CR11","unstructured":"WP29 (2014) Opinion 8\/2014 on recent developments on the internet of things. http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2014\/wp223_en.pdf . Accessed 12 Feb 2016"},{"key":"939_CR12","volume-title":"The division of labour in society","author":"E Durkheim","year":"1893","unstructured":"Durkheim E (1893) The division of labour in society. Presses Universitaires de France, Paris"},{"issue":"2","key":"939_CR13","doi-asserted-by":"crossref","first-page":"158","DOI":"10.2307\/2796343","volume":"1","author":"JA Barnes","year":"1966","unstructured":"Barnes JA (1966) Durkheim\u2019s division of labour in society. Man 1(2):158\u2013175","journal-title":"Man"},{"key":"939_CR14","first-page":"109","volume-title":"Phenomenological sociology","author":"E Bittner","year":"1973","unstructured":"Bittner E (1973) Objectivity and realism in sociology. In: Psathas G (ed) Phenomenological sociology. Wiley, Hoboken, pp 109\u2013125"},{"key":"939_CR15","volume-title":"A contribution to the critique of political economy","author":"K Marx","year":"1859","unstructured":"Marx K (1859) A contribution to the critique of political economy. Progress Publishers, Moscow"},{"key":"939_CR16","first-page":"814","volume":"38","author":"P Bourdieu","year":"1987","unstructured":"Bourdieu P (1987) The force of law: toward a sociology of the juridical field. Hastings Law J 38:814\u2013843","journal-title":"Hastings Law J"},{"key":"939_CR17","volume-title":"The protestant ethic and the spirit of capitalism","author":"M Weber","year":"1905","unstructured":"Weber M (1905) The protestant ethic and the spirit of capitalism. Unwin Hyman, Crows Nest"},{"key":"939_CR18","volume-title":"An inquiry into the wealth of nations","author":"A Smith","year":"1776","unstructured":"Smith A (1776) An inquiry into the wealth of nations. Methuen & Co, London"},{"key":"939_CR19","unstructured":"Japan (2014) Policy outline of the institutional revision for utilization of personal data. http:\/\/japan.kantei.go.jp\/policy\/it\/20140715_2.pdf . Accessed 12 Feb 2016"},{"key":"939_CR20","unstructured":"FTC (2013) Internet of things: privacy and security in a connected world. https:\/\/www.ftc.gov\/system\/files\/documents\/reports\/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy\/150127iotrpt.pdf . Accessed 12 Feb 2016"},{"key":"939_CR21","unstructured":"Winstein K (2015) Introducing the right to eavesdrop on your things. The agenda magazine, July edn. http:\/\/www.politico.com\/agenda\/story\/2015\/06\/internet-of-things-privacy-concerns-000107 . Accessed 12 Feb 2016"},{"key":"939_CR22","volume-title":"Who owns the future?","author":"J Lanier","year":"2013","unstructured":"Lanier J (2013) Who owns the future?. Simon and Schuster, New York"},{"key":"939_CR23","unstructured":"Larsen R, Brochot G, Lewis D, Eisma F, Brunini J (2015) Personal data stores. https:\/\/ec.europa.eu\/digital-agenda\/en\/news\/study-personal-data-stores-conducted-cambridge-university-judge-business-school . Accessed 12 Feb 2016"},{"key":"939_CR24","doi-asserted-by":"crossref","unstructured":"Crabtree A, Mortier R (2015) Human data interaction: historical lessons from social studies and CSCW. In: Proc. of ECSCW. Springer, Oslo, pp 1\u201320","DOI":"10.1007\/978-3-319-20499-4_1"},{"key":"939_CR25","doi-asserted-by":"crossref","unstructured":"Chaudry A, Crowcroft J, Howard H, Madhavapeddy A, Mortier R, Haddadi H, McAuley D (2015) Personal data: thinking inside the box. In: Proc. of critical alternatives. ACM, Aarhus, pp 29\u201332","DOI":"10.7146\/aahcc.v1i1.21312"},{"issue":"9","key":"939_CR26","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MC.2011.225","volume":"44","author":"S Pearson","year":"2011","unstructured":"Pearson S, Casassa M (2011) Sticky policies: an approach for managing privacy across multiple parties. IEEE Comput 44(9):60\u201368","journal-title":"IEEE Comput"},{"key":"939_CR27","unstructured":"WP29 (2004) Opinion 10\/2004 on more harmonised information provision. http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2004\/wp100_en.pdf . Accessed 12 Feb 2016"},{"key":"939_CR28","unstructured":"Naughton J (2015) Fight back against internet giants\u2019 stranglehold on personal data starts here. The guardian, February 1, http:\/\/www.theguardian.com\/technology\/2015\/feb\/01\/control-personal-data-databox-end-user-agreement . Accessed 12 Feb 2016"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-016-0939-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-016-0939-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-016-0939-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:43:00Z","timestamp":1498333380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-016-0939-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,2]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["939"],"URL":"https:\/\/doi.org\/10.1007\/s00779-016-0939-3","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,2]]}}}