{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T01:35:16Z","timestamp":1776216916366,"version":"3.50.1"},"reference-count":173,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T00:00:00Z","timestamp":1499126400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N023013\/1"],"award-info":[{"award-number":["EP\/N023013\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s10676-017-9426-4","type":"journal-article","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T05:59:39Z","timestamp":1499147979000},"page":"157-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":130,"title":["Ethics of the health-related internet of things: a narrative review"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4709-6404","authenticated-orcid":false,"given":"Brent","family":"Mittelstadt","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,4]]},"reference":[{"key":"9426_CR1","unstructured":"Advisory Council to Google on the Right to be Forgotten. (2015). Report of the Advisory Council to Google on the Right to Be Forgotten. Google Docs. https:\/\/drive.google.com\/file\/d\/0B1UgZshetMd4cEI3SjlvV0hNbDA\/view?pli=1&usp=embed_facebook ."},{"key":"9426_CR2","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1002\/sec.227","volume":"4","author":"F Agrafioti","year":"2011","unstructured":"Agrafioti, F., Bui, F. M., & Hatzinakos, D. (2011). Medical biometrics in mobile health monitoring. Security and Communication Networks, 4, 525\u2013539. doi: 10.1002\/sec.227 .","journal-title":"Security and Communication Networks"},{"key":"9426_CR3","unstructured":"Ahamed, S. I., Talukder, N., & Haque, M. M. (2007a). Privacy challenges in context-sensitive access control for pervasive computing environment. In 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2007. Philadelphia, PA. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-50249180369&partnerID=40&md5=da4e8dd7956060a59a64ebf6dac97ecf ."},{"key":"9426_CR4","doi-asserted-by":"crossref","unstructured":"Ahamed, S. I., Talukder, N., & Kameas, A. D. (2007b). Towards privacy protection in pervasive healthcare. In 296\u2013303. 3rd IET International Conference on Intelligent Environments, IE\u201907. Ulm. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-67649784659&partnerID=40&md5=1317173c09f4221e24e19e389dd6f599 .","DOI":"10.1049\/cp:20070384"},{"issue":"0","key":"9426_CR5","first-page":"17","volume":"8","author":"Mark Andrejevic","year":"2014","unstructured":"Andrejevic, Mark (2014). Big data, big questions| the big data divide. International Journal of Communication, 8(0), 17.","journal-title":"International Journal of Communication"},{"key":"9426_CR6","unstructured":"Armac, I., Panchenko, A., Pettau, M., & Retkowitz, D. 2009. Privacy-friendly smart environments. In, 425\u2013431. NGMAST 2009\u20133rd International Conference on Next Generation Mobile Applications, Services and Technologies. Cardiff. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-74049140815&partnerID=40&md5=d531f04758ab995a44db1251d1149771 ."},{"key":"9426_CR7","first-page":"341","volume":"16","author":"SA Bag\u00fc\u00e9s","year":"2010","unstructured":"Bag\u00fc\u00e9s, S. A., Zeidler, A., Klein, C., Valdivielso, F., & Matias, R. (2010). Enabling personal privacy for pervasive computing environments. Journal of Universal Computer Science, 16, 341\u2013371.","journal-title":"Journal of Universal Computer Science"},{"key":"9426_CR8","unstructured":"Bag\u00fc\u00e9s, S. A., Zeidler, A., Valdivielso, F., & Matias, R. (2007a). Disappearing for a while: Using white lies in pervasive computing. In Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, 80\u201383. 6th ACM Workshop on Privacy in the Electronic Society, WPES\u201907, Held in Association with the 14th ACM Computer and Communications Security Conference. Alexandria, VA. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-74049138834&partnerID=40&md5=85eabfb98cfe5d40f843c493ea3d460a ."},{"key":"9426_CR9","first-page":"129","volume":"1","author":"SA Bag\u00fc\u00e9s","year":"2007","unstructured":"Bag\u00fc\u00e9s, S. A., Zeidler, A., Valdivielso, F., & Matias, R. (2007b). Sentry@Home-Leveraging the smart home for privacy in pervasive computing. International Journal of Smart Home, 1, 129\u2013146.","journal-title":"International Journal of Smart Home"},{"key":"9426_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-016-9754-5","author":"G Baldini","year":"2016","unstructured":"Baldini, G., Botterman, M., Neisse, R., & Tallacchini, M. (2016). Ethical design in the internet of things. Science and Engineering Ethics. doi: 10.1007\/s11948-016-9754-5 .","journal-title":"Science and Engineering Ethics"},{"key":"9426_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/s1386-5056(00)00130-1","volume":"61","author":"MJ Ball","year":"2001","unstructured":"Ball, M. J., & Lillis, J. (2001). E-Health: transforming the physician\/patient relationship. International Journal of Medical Informatics, 61, 1\u201310. doi: 10.1016\/s1386-5056(00)00130-1 .","journal-title":"International Journal of Medical Informatics"},{"issue":"1","key":"9426_CR12","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11277-011-0288-5","volume":"58","author":"Debasis Bandyopadhyay","year":"2011","unstructured":"Bandyopadhyay, Debasis, Jaydip Sen (2011). Internet of things: Applications and challenges in technology and standardization. Wireless Personal Communications, 58(1), 49\u201369. doi: 10.1007\/s11277-011-0288-5 .","journal-title":"Wireless Personal Communications"},{"key":"9426_CR13","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1016\/s0277-9536(00)00351-8","volume":"53","author":"CA Barry","year":"2001","unstructured":"Barry, C. A., Stevenson, F. A., Britten, N., Barber, N., & Bradley, C. P. (2001). Giving voice to the lifeworld. more humane, more effective medical care? A qualitative study of doctor-patient communication in general practice. Social Science and Medicine, 53, 487\u2013505. doi: 10.1016\/s0277-9536(00)00351-8 .","journal-title":"Social Science and Medicine"},{"issue":"2","key":"9426_CR14","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s10676-004-4591-7","volume":"6","author":"K Bauer","year":"2004","unstructured":"Bauer, K. (2004). \u2018Cybermedicine and the moral integrity of the physician\u2013patient relationship\u2019. Ethics and Information Technology, 6(2), 83\u201391.","journal-title":"Ethics and Information Technology"},{"key":"9426_CR15","volume-title":"Principles of biomedical ethics","author":"TL Beauchamp","year":"2009","unstructured":"Beauchamp, T. L., Childress, J. F. (2009). Principles of biomedical ethics. New York: Oxford University Press."},{"key":"9426_CR16","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.8.4.e29","author":"J Beaudin","year":"2006","unstructured":"Beaudin, J., Intille, S., & Morris, M. 2006. To track or not to track: user reactions to concepts in longitudinal health monitoring. Journal of Medical Internet Research. doi: 10.2196\/jmir.8.4.e29 .","journal-title":"Journal of Medical Internet Research"},{"issue":"e1","key":"9426_CR17","doi-asserted-by":"publisher","first-page":"e42","DOI":"10.1093\/jamia\/ocv118","volume":"23","author":"MJ Bietz","year":"2016","unstructured":"Bietz, M. J., Bloss, C. S., Calvert, S., Godino, J. G., Gregory, J., Claffey, M. P., et al. (2016). Opportunities and challenges in the use of personal health data for health research. Journal of the American Medical Informatics Association, 23(e1): e42\u2013e48. doi: 10.1093\/jamia\/ocv118 .","journal-title":"Journal of the American Medical Informatics Association"},{"key":"9426_CR18","unstructured":"Bohn, J, Coroam\u0103, V., Langheinrich, M., Mattern, F., & Rohs, M. (2005). Social, economic, and ethical implications of ambient intelligence and ubiquitous computing. Http:\/\/Www.vs.Inf.Ethz.Ch\/Publ\/Papers\/Socialambient.Pdf, 2004. Institute for Pervasive Computing\u2019. CiteSeerX. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.70.2159 ."},{"issue":"1","key":"9426_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/1369118X.2010.530673","volume":"15","author":"A Bowes","year":"2012","unstructured":"Bowes, A., Dawson, A., & Bell A. (2012). Ethical implications of lifestyle monitoring data in ageing research. Information, Communication & Society, 15(1), 5\u201322. doi: 10.1080\/1369118X.2010.530673 .","journal-title":"Information, Communication & Society"},{"issue":"5","key":"9426_CR20","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1080\/1369118X.2012.678878","volume":"15","author":"D Boyd","year":"2012","unstructured":"Boyd, D., & Crawford, K. (2012). Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information Communication & Society, 15(5), 662\u2013679. doi: 10.1080\/1369118X.2012.678878 .","journal-title":"Information Communication & Society"},{"issue":"3","key":"9426_CR21","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s10676-006-0005-3","volume":"7","author":"P Brey","year":"2005","unstructured":"Brey, P. (2005). Freedom and privacy in ambient intelligence. Ethics and Information Technology, 7(3), 157\u2013166.","journal-title":"Ethics and Information Technology"},{"key":"9426_CR22","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715622512","author":"J Burrell","year":"2016","unstructured":"Burrell, J. (2016). How the machine \u201cthinks\u201d: Understanding opacity in machine learning algorithms. Big Data & Society. doi: 10.1177\/2053951715622512 .","journal-title":"Big Data & Society"},{"key":"9426_CR23","unstructured":"Busnel, P., & Giroux, S. (2010). Security, privacy, and dependability in smart homes: A pattern catalog approach. In Vol.\u00a06159 LNCS. 8th International Conference on Smart Homes and Health Telematics, ICOST 2010. Seoul. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-77955446331&partnerID=40&md5=b20fa2bca706ec75ab071f1fcd3554c8 ."},{"key":"9426_CR24","unstructured":"Caine, K. E., Fisk, A. D., & Rogers, W. A. 2006. Benefits and privacy concerns of a home equipped with a visual sensing system: A perspective from older adults. In 180\u2013184. 50th Annual Meeting of the Human Factors and Ergonomics Society, HFES 2006. San Francisco. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-44349169380&partnerID=40&md5=2b10e6a27ff9837d6d5b4c5c6793efbe ."},{"key":"9426_CR25","unstructured":"Center for Devices and Radiological Health. (2014). Content of premarket submissions for management of cybersecurity in medical devices. Washington, D.C.: U.S. Department of Health and Human Services. http:\/\/www.fda.gov\/downloads\/medicaldevices\/deviceregulationandguidance\/guidancedocuments\/ucm482022.pdf ."},{"key":"9426_CR26","unstructured":"Chakraborty, S., Choi, H., & Srivastava, M. B. (2011). Demystifying privacy in sensory data: A QoI based approach. In 38\u201343. 2011 9th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2011. Seattle. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-79958057222&partnerID=40&md5=e907b7a413b53870811659ac9d8b0682 ."},{"issue":"2","key":"9426_CR27","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.maturitas.2009.07.014","volume":"64","author":"M Chan","year":"2009","unstructured":"Chan, M., Campo, E., Est\u00e8ve, D., & Fourniols, J. Y. (2009). Smart homes\u2014current features and future perspectives. Maturitas, 64(2), 90\u201397. doi: 10.1016\/j.maturitas.2009.07.014 .","journal-title":"Maturitas"},{"key":"9426_CR28","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.cmpb.2008.02.001","volume":"91","author":"M Chan","year":"2008","unstructured":"Chan, M., Est\u00e8ve, D., Escriba, C., & Campo, E. (2008). A review of smart homes: Present state and future challenges. Computer Methods and Programs in Biomedicine, 91, 55\u201381. doi: 10.1016\/j.cmpb.2008.02.001 .","journal-title":"Computer Methods and Programs in Biomedicine"},{"issue":"7391","key":"9426_CR29","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1136\/bmj.326.7391.707","volume":"326","author":"S Chapman","year":"2003","unstructured":"Chapman, S., Reeve, E., Rajaratnam, G. & Neary, R. (2003). Setting up an outcomes guarantee for pharmaceuticals: new approach to risk sharing in primary care. British Medical Journal, 326(7391), 707.","journal-title":"British Medical Journal"},{"key":"9426_CR30","doi-asserted-by":"publisher","first-page":"239","DOI":"10.3389\/fnhum.2014.00239","volume":"8","author":"S Choudhury","year":"2014","unstructured":"Choudhury, S., Fishman, J. R., McGowan, M. L., & Juengst, E. T. (2014). Big data, open science and the brain: Lessons learned from genomics. Frontiers in Human Neuroscience, 8, 239. doi: 10.3389\/fnhum.2014.00239 .","journal-title":"Frontiers in Human Neuroscience"},{"issue":"12","key":"9426_CR31","doi-asserted-by":"publisher","first-page":"2596","DOI":"10.1002\/asi.23356","volume":"66","author":"Andrew Clarke","year":"2015","unstructured":"Clarke, Andrew, Robert Steele (2015). Smartphone-based public health information systems: Anonymity, privacy and intervention. Journal of the Association for Information Science & Technology, 66(12), 2596\u20132608. doi: 10.1002\/asi.23356 .","journal-title":"Journal of the Association for Information Science & Technology"},{"issue":"1","key":"9426_CR32","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1111\/j.1748-720X.2005.tb00206.x","volume":"33","author":"EW Clayton","year":"2005","unstructured":"Clayton, E. W. (2005). Informed consent and Biobanks. Journal of Law, Medicine & Ethics, 33(1), 15\u201321. doi: 10.1111\/j.1748-720X.2005.tb00206.x .","journal-title":"Journal of Law, Medicine & Ethics"},{"issue":"4","key":"9426_CR33","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s11019-013-9463-7","volume":"16","author":"M Coeckelbergh","year":"2013","unstructured":"Coeckelbergh, M. (2013). E-care as craftsmanship: Virtuous work, skilled engagement, and information technology in health care. Medicine, Health Care and Philosophy, 16(4), 807\u2013816. doi: 10.1007\/s11019-013-9463-7 .","journal-title":"Medicine, Health Care and Philosophy"},{"issue":"10","key":"9426_CR34","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1080\/1369118X.2014.918636","volume":"17","author":"S Coll","year":"2014","unstructured":"Coll, S. (2014). Power, knowledge, and the subjects of privacy: understanding privacy as the ally of surveillance. Information Communication & Society, 17(10), 1250\u20131263. doi: 10.1080\/1369118X.2014.918636 .","journal-title":"Information Communication & Society"},{"issue":"4","key":"9426_CR35","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1016\/j.drudis.2013.10.012","volume":"19","author":"FF Costa","year":"2014","unstructured":"Costa, F. F. (2014). Big data in biomedicine. Drug Discovery Today, 19(4), 433\u2013440. doi: 10.1016\/j.drudis.2013.10.012 .","journal-title":"Drug Discovery Today"},{"key":"9426_CR36","doi-asserted-by":"publisher","unstructured":"Coughlin, J. F., D\u2019Ambrosio, L. A., Reimer, B., & Pratt, M. R. 2007. Older adult perceptions of smart home technologies: Implications for research, policy & market innovations in healthcare. In Proceedings of the 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2007. EMBS 2007, 1810\u20131815. doi: 10.1109\/IEMBS.2007.4352665 .","DOI":"10.1109\/IEMBS.2007.4352665"},{"key":"9426_CR37","unstructured":"Coughlin, J. F., Lau, J., D\u2019Ambrosio, L. A., & Reimer, B. (2009). Adult children\u2019s perceptions of intelligent home systems in the care of elderly parents. In 3rd International Convention on Rehabilitation Engineering and Assistive Technology, ICREATE\u201909. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-70449639811&partnerID=40&md5=97a0f07bfa75dc9a0eaa8e29217ed9e0 ."},{"key":"9426_CR38","doi-asserted-by":"publisher","first-page":"76","DOI":"10.3414\/me9104","volume":"47","author":"KL Courtney","year":"2008","unstructured":"Courtney, K. L. (2008). Privacy and senior willingness to adopt smart home information technology in residential care facilities. Methods of Information in Medicine, 47, 76\u201381. doi: 10.3414\/me9104 .","journal-title":"Methods of Information in Medicine"},{"key":"9426_CR39","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1080\/14639230701447735","volume":"32","author":"KL Courtney","year":"2007","unstructured":"Courtney, K. L., Demiris, G., & Hensel, B. K. (2007). Obtrusiveness of information-based assistive technologies as perceived by older adults in residential care facilities: A secondary analysis. Medical Informatics and the Internet in Medicine, 32, 241\u2013249. doi: 10.1080\/14639230701447735 .","journal-title":"Medical Informatics and the Internet in Medicine"},{"key":"9426_CR40","first-page":"195","volume":"16","author":"KL Courtney","year":"2008","unstructured":"Courtney, K. L., Demiris, G., Rantz, M., & Skubic, M. (2008). Needing smart home technologies: The perspectives of older adults in continuing care retirement communities. Informatics in Primary Care, 16, 195\u2013201.","journal-title":"Informatics in Primary Care"},{"key":"9426_CR41","doi-asserted-by":"publisher","first-page":"S127","DOI":"10.1542\/peds.2013-0252c","volume":"131","author":"J Currie","year":"2013","unstructured":"Currie, J. 2013. \u201cBig data\u201d versus \u201cbig brother\u201d: On the appropriate use of large-scale data collections in pediatrics\u2019. Pediatrics 131: S127\u2013S132. doi: 10.1542\/peds.2013-0252c .","journal-title":"Pediatrics"},{"issue":"9","key":"9426_CR42","first-page":"489","volume":"29","author":"L Bleser De","year":"2011","unstructured":"De Bleser, L., De Geest, S., Vincke, B., Ruppar, T., Vanhaecke, J., & Dobbels, F. (2011). How to test electronic adherence monitoring devices for use in daily life: A conceptual framework. CIN, 29(9), 489\u2013495.","journal-title":"CIN"},{"key":"9426_CR44","first-page":"87","volume":"29","author":"G Demiris","year":"2004","unstructured":"Demiris, G., Rantz, M., Aud, M., Marek, K., Tyrer, H., Skubic, M., et al. (2004). Older adults\u2019 attitudes towards and perceptions of \u2018smart home\u2019 technologies: A pilot study. Informatics for Health and Social Care, 29, 87\u201394. (citeulike-article-id:6074761).","journal-title":"Informatics for Health and Social Care"},{"key":"9426_CR45","doi-asserted-by":"crossref","unstructured":"Demiris, G. (2009). Privacy and social implications of distinct sensing approaches to implementing smart homes for older adults. In Conference Proceedings: Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Conference (pp. 4311\u20134314). http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-77951231210&partnerID=40&md5=4c55b833f18f571a9142982593f93f24 .","DOI":"10.1109\/IEMBS.2009.5333800"},{"key":"9426_CR46","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1080\/02763890802665049","volume":"23","author":"G Demiris","year":"2009","unstructured":"Demiris, G., & Hensel, B. K. (2009). \u201cSmart homes\u201d for patients at the end of life. Journal of Housing for the Elderly, 23, 106\u2013115. doi: 10.1080\/02763890802665049 .","journal-title":"Journal of Housing for the Elderly"},{"issue":"1","key":"9426_CR47","first-page":"137","volume":"10","author":"K Denecke","year":"2015","unstructured":"Denecke, K., Bamidis, P., Bond, C., Gabarron, E., Househ, M., Lau, A. Y. S. et al. (2015). Ethical issues of social media usage in healthcare. IMIA Yearbook of Medical Informatics 10(1), 137\u201347.","journal-title":"IMIA Yearbook of Medical Informatics"},{"key":"9426_CR48","unstructured":"Dhukaram, A. V., Baber, C., Elloumi, L., Van Beijnum, B. J., & De Stefanis, P. (2011). End-user perception towards pervasive cardiac healthcare services: benefits, acceptance, adoption, risks, security, privacy and trust. In 478\u2013484. 5th International Conference on Pervasive Computing Technologies for Healthcare and Workshops, Pervasive Health 2011. Dublin. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-80054938130&partnerID=40&md5=72d5cd50d9607fcde8a2fe9e0fb6209d ."},{"key":"9426_CR49","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1525\/jer.2009.4.1.25","volume":"4","author":"AM Dorsten","year":"2009","unstructured":"Dorsten, A. M., Sifford, S. K., Bharucha, A., Mecca, L. P., & Wactlar, H. (2009). Ethical perspectives on emerging assistive technologies: insights from focus groups with stakeholders in long-term care facilities. Journal of Empirical Research on Human Research Ethics, 4, 25\u201336. doi: 10.1525\/jer.2009.4.1.25 .","journal-title":"Journal of Empirical Research on Human Research Ethics"},{"key":"9426_CR50","unstructured":"Ebersold, K., Glass, R. (2016). The internet of things: A cause for ethical concern. Issues in Information Systems. http:\/\/www.iacis.org\/iis\/2016\/4_iis_2016_145-151.pdf ."},{"issue":"2","key":"9426_CR51","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s11019-005-2277-5","volume":"8","author":"A Edgar","year":"2005","unstructured":"Edgar, A. (2005). The expert patient: Illness as practice. Medicine, Health Care and Philosophy, 8(2), 165\u2013171.","journal-title":"Medicine, Health Care and Philosophy"},{"key":"9426_CR73","unstructured":"E-Health Insider. (2014). The year of the wearable. http:\/\/www.ehi.co.uk\/insight\/analysis\/1404\/the-year-of-the-wearable ."},{"key":"9426_CR52","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.3844\/jcssp.2011.1465.1473","volume":"7","author":"M Elkhodr","year":"2011","unstructured":"Elkhodr, M., Shahrestani, S., & Cheung, H. (2011). Ubiquitous health monitoring systems: addressing security concerns. Journal of Computer Science, 7, 1465\u20131473. doi: 10.3844\/jcssp.2011.1465.1473 .","journal-title":"Journal of Computer Science"},{"key":"9426_CR53","unstructured":"Empirica, W. R. C. (2010). ICT & Ageing-European Study on Users, Markets and Technologies: Final Report\u2019 European Commission. http:\/\/www.ict-ageing.eu\/ict-ageing-website\/wp-content\/uploads\/2010\/D18_final_report.pdf ."},{"key":"9426_CR54","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.socscimed.2008.03.005","volume":"67","author":"A. Ess\u00e9n","year":"2008","unstructured":"Ess\u00e9n, A. (2008). The two facets of electronic care surveillance: An exploration of the views of older people who live with monitoring devices\u2019. Social Science & Medicine, 67, 128\u2013136. doi: 10.1016\/j.socscimed.2008.03.005 .","journal-title":"Social Science & Medicine"},{"issue":"1","key":"9426_CR55","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1080\/08900523.2014.863126","volume":"29","author":"J Fairfield","year":"2014","unstructured":"Fairfield, J., Shtein, H. (2014). Big data, big problems: Emerging issues in the ethics of data science and journalism. Journal of Mass Media Ethics, 29(1), 38\u201351. doi: 10.1080\/08900523.2014.863126 .","journal-title":"Journal of Mass Media Ethics"},{"issue":"4","key":"9426_CR56","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s11023-011-9259-6","volume":"21","author":"L Floridi","year":"2011","unstructured":"Floridi, L. (2011). The informational nature of personal identity. Minds and Machines, 21(4), 549\u2013566. doi: 10.1007\/s11023-011-9259-6 .","journal-title":"Minds and Machines"},{"issue":"4","key":"9426_CR57","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s13347-016-0220-8","volume":"29","author":"L Floridi","year":"2016","unstructured":"Floridi, L. (2016). On human dignity as a foundation for the right to privacy. Philosophy and Technology, 29(4), 307\u2013312.","journal-title":"Philosophy and Technology"},{"issue":"1","key":"9426_CR58","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.tele.2005.12.005","volume":"24","author":"M Friedewald","year":"2007","unstructured":"Friedewald, M., Vildjiounaite, E., Punie, Y., & Wright, D. (2007). Privacy, identity and security in ambient intelligence: A scenario analysis. Telematics and Informatics, 24(1), 15\u201329. doi: 10.1016\/j.tele.2005.12.005 .","journal-title":"Telematics and Informatics"},{"key":"9426_CR59","doi-asserted-by":"crossref","unstructured":"Fugger, E., Prazak, B., Hanke, S., & Wassertheurer, S. 2007. Requirements and ethical issues for sensor-augmented environments in Elderly care. Vol.\u00a04554 LNCS. 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Beijing.","DOI":"10.1007\/978-3-540-73279-2_99"},{"key":"9426_CR60","volume-title":"The historicity of understanding","author":"HG Gadamer","year":"1976","unstructured":"Gadamer, H. G. (1976). The historicity of understanding. Harmondsworth: Penguin Books Ltd."},{"key":"9426_CR61","volume-title":"Truth and method","author":"HG Gadamer","year":"2004","unstructured":"Gadamer, H. G. (2004). Truth and method. New York: Continuum International Publishing Group."},{"key":"9426_CR62","unstructured":"Garcia-Morchon, O., Falck, T., Heer, T., & Wehrle, K. (2009). Security for pervasive healthcare. In 2009 6th Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2009. Toronto. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-72749094993&partnerID=40&md5=211a0a60d270e569349b0177265e29cd ."},{"key":"9426_CR63","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1002\/sec.247","volume":"4","author":"O Garcia-Morchon","year":"2011","unstructured":"Garcia-Morchon, O., Falck, T., & Wehrle, K. (2011). Sensor network security for pervasive e-health. Security and Communication Networks, 4, 1257\u20131273. doi: 10.1002\/sec.247 .","journal-title":"Security and Communication Networks"},{"key":"9426_CR64","doi-asserted-by":"crossref","unstructured":"Gaul, S., Ziefle, M. (2009). Smart home technologies: Insights into generation-specific acceptance motives. In HCI and Usability for E-Inclusion, edited by Andreas Holzinger and Klaus Miesenberger, 312\u2013332. Lecture Notes in Computer Science 5889. Berlin: Springer. http:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-10308-7_22 .","DOI":"10.1007\/978-3-642-10308-7_22"},{"issue":"2","key":"9426_CR65","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s11019-011-9366-4","volume":"15","author":"P Gelhaus","year":"2012","unstructured":"Gelhaus, P. (2012a). The desired moral attitude of the physician: (I) Empathy. Medicine, Health Care and Philosophy, 15(2), 103\u2013113. doi: 10.1007\/s11019-011-9366-4 .","journal-title":"Medicine, Health Care and Philosophy"},{"issue":"4","key":"9426_CR66","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s11019-011-9368-2","volume":"15","author":"P Gelhaus","year":"2012","unstructured":"Gelhaus, P. (2012b). The desired moral attitude of the physician: (II) Compassion. Medicine, Health Care and Philosophy, 15(4), 397\u2013410. doi: 10.1007\/s11019-011-9368-2 .","journal-title":"Medicine, Health Care and Philosophy"},{"key":"9426_CR67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16392-0_5","volume-title":"Privacy and security in ubiquitous knowledge discovery. Lecture Notes in Computer Science","author":"F Giannotti","year":"2010","unstructured":"Giannotti, F., Saygin, Y. (2010). Privacy and security in ubiquitous knowledge discovery. Lecture Notes in Computer Science. Berlin: Springer. doi: 10.1007\/978-3-642-16392-0_5 ."},{"issue":"1881","key":"9426_CR68","doi-asserted-by":"publisher","first-page":"3823","DOI":"10.1098\/rsta.2008.0123","volume":"366","author":"A Greenfield","year":"2008","unstructured":"Greenfield, A. (2008). Some guidelines for the ethical development of ubiquitous computing. Philosophical Transactions of the Royal Society A, 366(1881), 3823\u20132831. doi: 10.1098\/rsta.2008.0123 .","journal-title":"Philosophical Transactions of the Royal Society A"},{"key":"9426_CR70","doi-asserted-by":"publisher","unstructured":"Haddadi, H., Ofli, F., Mejova, Y., Weber, I., & Srivastava, J. (2015). 360-Degree quantified self. In 587\u2013592. IEEE. doi: 10.1109\/ICHI.2015.95 .","DOI":"10.1109\/ICHI.2015.95"},{"issue":"4","key":"9426_CR71","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1080\/00071310020015280","volume":"51","author":"KD Haggerty","year":"2000","unstructured":"Haggerty, K. D., Ericson, R. V. (2000). The surveillant assemblage. The British Journal of Sociology, 51(4), 605\u2013622. doi: 10.1080\/00071310020015280 .","journal-title":"The British Journal of Sociology"},{"issue":"1","key":"9426_CR72","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1038\/sj.bjc.6604795","volume":"100","author":"MG Hansson","year":"2009","unstructured":"Hansson, M. G. (2009). Ethics and biobanks. British Journal of Cancer, 100(1), 8\u201312. doi: 10.1038\/sj.bjc.6604795 .","journal-title":"British Journal of Cancer"},{"key":"9426_CR74","doi-asserted-by":"publisher","first-page":"f1035","DOI":"10.1136\/bmj.f1035","volume":"346","author":"C Henderson","year":"2013","unstructured":"Henderson, C., Knapp, M., Fernandez, J.-L., Beecham, J., Hirani, S. P. Cartwright, M., et al. (2013). Cost effectiveness of telehealth for patients with long term conditions (whole systems demonstrator telehealth questionnaire study): Nested economic evaluation in a pragmatic, cluster randomised controlled trial. BMJ, 346, f1035\u2013f1035. doi: 10.1136\/bmj.f1035 .","journal-title":"BMJ"},{"key":"9426_CR75","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1197\/jamia.M2026","volume":"13","author":"BK Hensel","year":"2006","unstructured":"Hensel, B. K., Demiris, G., & Courtney, K. L. (2006). Defining obtrusiveness in home telehealth technologies: A conceptual framework. Journal of the American Medical Informatics Association, 13, 428\u2013431. doi: 10.1197\/jamia.M2026 .","journal-title":"Journal of the American Medical Informatics Association"},{"key":"9426_CR76","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1016\/j.future.2015.09.016","volume":"56","author":"M Henze","year":"2016","unstructured":"Henze, M., Hermerschmidt, L., Kerpen, D., H\u00e4u\u00dfling, R., Rumpe, B., & Wehrle, K. (2016). A comprehensive approach to privacy in the cloud-based internet of things. Future Generation Computer Systems, 56, 701\u2013718. doi: 10.1016\/j.future.2015.09.016 .","journal-title":"Future Generation Computer Systems"},{"issue":"6","key":"9426_CR77","first-page":"437","volume":"56","author":"N Higuchi","year":"2013","unstructured":"Higuchi, N. (2013). Three challenges in advanced medicine. Japan Medical Association Journal, 56(6), 437\u2013447.","journal-title":"Japan Medical Association Journal"},{"key":"9426_CR78","doi-asserted-by":"crossref","unstructured":"Hildebrandt, M. (2008). Defining profiling: A new type of knowledge?. In M. Hildebrandt & S. Gutwirth (Eds.) Profiling the European citizen (pp. 17\u201345). Dordrecht: Springer. http:\/\/link.springer.com\/chapter\/10.1007\/978-1-4020-6914-7_2 .","DOI":"10.1007\/978-1-4020-6914-7_2"},{"key":"9426_CR79","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4020-6914-7","volume-title":"Profiling the European citizen","author":"M Hildebrandt","year":"2008","unstructured":"Hildebrandt, M., & Gutwirth, S. (2008). Profiling the European citizen. Dordrecht: Springer."},{"key":"9426_CR80","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1186\/s12916-015-0444-y","volume":"13","author":"K Huckvale","year":"2015","unstructured":"Huckvale, K., Prieto, J. T., Tilney, M., Benghozi, P. J. & Car, J. (2015). Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment. BMC Medicine, 13, 214. doi: 10.1186\/s12916-015-0444-y .","journal-title":"BMC Medicine"},{"issue":"4","key":"9426_CR81","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1080\/15265161.2013.768864","volume":"13","author":"JPA Ioannidis","year":"2013","unstructured":"Ioannidis, J. P. A. (2013). Informed consent, big data, and the oxymoron of research that is not research\u2019. American Journal of Bioethics, 13(4), 40\u201342. doi: 10.1080\/15265161.2013.768864 .","journal-title":"American Journal of Bioethics"},{"key":"9426_CR82","unstructured":"Jea, D., Liu, J., Schmid, T., & Srivastava, M. (2008). Hassle free fitness monitoring. In 2nd International Workshop on Systems and Networking Support for Health Care and Assisted Living Environments, HealthNet\u201908. Breckenridge. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-70349112153&partnerID=40&md5=65ede36cbc6922ee8365f8685b9403cd ."},{"issue":"3","key":"9426_CR83","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1145\/2874239.2874285","volume":"45","author":"T Jiya","year":"2016","unstructured":"Jiya, T. (2016). A realisation of ethical concerns with smartphone personal health monitoring apps. ACM SIGCAS Computers and Society, 45(3), 313\u2013317.","journal-title":"ACM SIGCAS Computers and Society"},{"issue":"2","key":"9426_CR84","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1038\/ejhg.2014.71","volume":"23","author":"Jane Kaye","year":"2015","unstructured":"Kaye, Jane, Whitley, E. A., Lund, D., Morrison, M., Teare, H. & Karen Melham (2015). Dynamic consent: A patient interface for twenty-first century research networks. European Journal of Human Genetics, 23(2), 141\u2013146. doi: 10.1038\/ejhg.2014.71 .","journal-title":"European Journal of Human Genetics"},{"key":"9426_CR85","first-page":"252","volume":"5","author":"AM Kenner","year":"2008","unstructured":"Kenner, A. M. (2008). \u2018Securing the elderly body: Dementia, surveillance, and the politics of \u201caging in place\u2019. Surveillance & Society, 5, 252\u2013269.","journal-title":"Surveillance & Society"},{"key":"9426_CR86","unstructured":"Knobel, C. P. (2010). Ontic occlusion and exposure in sociotechnical systems. Pittsburgh: University of Pittsburgh. http:\/\/deepblue.lib.umich.edu\/handle\/2027.42\/78763 ."},{"key":"9426_CR87","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s11948-009-9150-5","volume":"16","author":"E Kosta","year":"2010","unstructured":"Kosta, E., Pitk\u00e4nen, O., Niemel\u00e4, M., & Kaasinen, E. (2010). Mobile-centric ambient intelligence in health- and homecare-anticipating ethical and legal challenges. Science and Engineering Ethics, 16, 303\u2013323.","journal-title":"Science and Engineering Ethics"},{"key":"9426_CR88","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2016.00007","author":"P Kostkova","year":"2016","unstructured":"Kostkova, P., Brewer, H., de Lusignan, S., Fottrell, E., Goldacre, B., Hart, G., et al. (2016). Who owns the data? Open data for healthcare. Frontiers in Public Health. doi: 10.3389\/fpubh.2016.00007 .","journal-title":"Frontiers in Public Health"},{"key":"9426_CR89","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1017\/S1041610210001316","volume":"22","author":"R Landau","year":"2010","unstructured":"Landau, R., Werner, S., Auslander, G. K., Shoval, N., & Heinik, J. (2010). What do cognitively intact older people think about the use of electronic tracking devices for people with dementia? A preliminary analysis. International Psychogeriatrics, 22, 1301\u20131309.","journal-title":"International Psychogeriatrics"},{"issue":"3","key":"9426_CR90","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MITP.2016.42","volume":"18","author":"PA Laplante","year":"2016","unstructured":"Laplante, P. A., Laplante, N. (2016). The internet of things in healthcare: Potential applications and challenges. IT Professional, 18(3), 2\u20134.","journal-title":"IT Professional"},{"key":"9426_CR91","unstructured":"Laurance, J. (2011). Revolutionary \u201cwrist watch\u201d to monitor high blood pressure. The Independent. http:\/\/www.independent.co.uk\/life-style\/health-and-families\/health-news\/revolutionary-wrist-watch-to-monitor-high-blood-pressure-2220650.html ."},{"key":"9426_CR92","unstructured":"Leone, A., Diraco, G., & Siciliano, P. (2011). Topological and volumetric posture recognition with active vision sensor in AAL Contexts. In 110\u2013114. 4th IEEE International Workshop on Advances in Sensors and Interfaces, IWASI 2011. Savelletri di Fasano, Brindisi. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-80052912635&partnerID=40&md5=73df8346c8100079e408eb255f47c961 ."},{"key":"9426_CR93","unstructured":"Little, L., & Briggs, P. (2009). Pervasive healthcare: The elderly perspective. In 2nd International Conference on PErvasive Technologies Related to Assistive Environments, PETRA 2009. Corfu. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-70450235243&partnerID=40&md5=8e09eaa23fd61ef86a45f904c7451b03 ."},{"key":"9426_CR94","unstructured":"Lomas, C. (2009). Telehealth system slashes hospital admissions in COPD patients. http:\/\/www.nursingtimes.net\/nursing-practice\/clinical-zones\/copd\/telehealth-system-slashes-hospital-admissions-in-copd-patients\/5005885.article ."},{"issue":"3","key":"9426_CR95","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1057\/sth.2012.6","volume":"10","author":"D Lupton","year":"2012","unstructured":"Lupton, D. (2012). M-health and health promotion: The digital cyborg and surveillance society. Social Theory & Health, 10(3), 229\u2013244.","journal-title":"Social Theory & Health"},{"issue":"3","key":"9426_CR96","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1057\/sth.2013.10","volume":"11","author":"D Lupton","year":"2013","unstructured":"Lupton, D. (2013a). The digitally engaged patient: Self-monitoring and self-care in the digital health era. Social Theory & Health, 11(3), 256\u2013270.","journal-title":"Social Theory & Health"},{"issue":"4","key":"9426_CR97","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1080\/09581596.2013.794931","volume":"23","author":"D Lupton","year":"2013","unstructured":"Lupton, D. (2013b). Quantifying the body: Monitoring and measuring health in the age of mHealth technologies. Critical Public Health, 23(4), 393\u2013403.","journal-title":"Critical Public Health"},{"issue":"6","key":"9426_CR98","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1111\/1467-9566.12109","volume":"36","author":"D Lupton","year":"2014","unstructured":"Lupton, D. (2014a). The commodification of patient opinion: The digital patient experience economy in the age of big data. Sociology of Health & Illness, 36(6), 856\u2013869. doi: 10.1111\/1467-9566.12109 .","journal-title":"Sociology of Health & Illness"},{"issue":"6","key":"9426_CR99","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1111\/1467-9566.12109","volume":"36","author":"D Lupton","year":"2014","unstructured":"Lupton, D. (2014b). The commodification of patient opinion: The digital patient experience economy in the age of big data. Sociology of Health & Illness, 36(6), 856\u2013869. doi: 10.1111\/1467-9566.12109 .","journal-title":"Sociology of Health & Illness"},{"issue":"1","key":"9426_CR100","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1093\/heapro\/dau091","volume":"30","author":"D Lupton","year":"2015","unstructured":"Lupton, D. (2015). Health promotion in the digital era: A critical commentary. Health Promotion International, 30(1), 174\u2013183. doi: 10.1093\/heapro\/dau091 .","journal-title":"Health Promotion International"},{"key":"9426_CR101","volume-title":"Surveillance as social sorting: Privacy, risk, and digital discrimination","author":"D Lyon","year":"2003","unstructured":"Lyon, D. (2003). Surveillance as social sorting: Privacy, risk, and digital discrimination. London: Routledge."},{"key":"9426_CR102","volume-title":"After virtue: A study in moral theory","author":"Alasdair MacIntyre","year":"2007","unstructured":"MacIntyre, Alasdair. 2007. After virtue: A study in moral theory (3rd ed.). London: Gerald Duckworth & Co Ltd.","edition":"3"},{"key":"9426_CR103","first-page":"75","volume":"12","author":"M Mana","year":"2011","unstructured":"Mana, M., Feham, M., & Bensaber, B. A. (2011). Trust key management scheme for wireless body area networks. International Journal of Network Security, 12, 75\u201383.","journal-title":"International Journal of Network Security"},{"issue":"3","key":"9426_CR104","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1023\/A:1012456832336","volume":"3","author":"Gary T Marx","year":"2001","unstructured":"Marx, Gary T (2001). Murky conceptual waters: The public and the private. Ethics and Information Technology, 3(3), 157\u2013169.","journal-title":"Ethics and Information Technology"},{"key":"9426_CR105","unstructured":"Massacci, F., Nguyen, V. H., & Saidane, A. (2009). No purpose, no data: goal-oriented access control forambient assisted living. In 53\u201357. 1st ACM Workshop on Security and Privacy in Medical and Home-Care Systems, SPIMACS\u201909, Co-Located with the 16th ACM Computer and Communications Security Conference, CCS\u201909. Chicago. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-74049137043&partnerID=40&md5=98e37b22f5acce7ffaf8f6bdac154020 ."},{"key":"9426_CR106","doi-asserted-by":"publisher","DOI":"10.1038\/ejhg.2014.143","author":"Zubin Master","year":"2014","unstructured":"Master, Zubin, Lisa Campo-Engelstein, Timothy Caulfield (2014). Scientists\u2019 perspectives on consent in the context of biobanking research. European Journal of Human Genetics. doi: 10.1038\/ejhg.2014.143 .","journal-title":"European Journal of Human Genetics"},{"issue":"1","key":"9426_CR107","doi-asserted-by":"publisher","first-page":"100","DOI":"10.4103\/2229-3485.106405","volume":"4","author":"J Mathaiyan","year":"2013","unstructured":"Mathaiyan, J., Chandrasekaran, A., Davis, S. (2013). Ethics of genomic research. Perspectives in Clinical Research, 4(1), 100. doi: 10.4103\/2229-3485.106405 .","journal-title":"Perspectives in Clinical Research"},{"issue":"12","key":"9426_CR108","doi-asserted-by":"publisher","first-page":"1861","DOI":"10.1101\/gr.081653.108","volume":"18","author":"AL McGuire","year":"2008","unstructured":"McGuire, A. L., Colgrove, J., Whitney, S. N., Diaz, C. M., Bustillos, D., & Versalovic, J. (2008). Ethical, legal, and social considerations in conducting the human microbiome project. Genome Research, 18(12), 1861\u20131864. doi: 10.1101\/gr.081653.108 .","journal-title":"Genome Research"},{"key":"9426_CR109","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s10676-011-9276-4","volume":"13","author":"Athena McLean","year":"2011","unstructured":"McLean, Athena (2011). Ethical frontiers of ict and older users: cultural, pragmatic and ethical issues. Ethics and Information Technology, 13, 313\u2013326. doi: 10.1007\/s10676-011-9276-4 .","journal-title":"Ethics and Information Technology"},{"issue":"4","key":"9426_CR111","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1111\/ropr.12082","volume":"31","author":"CL McNeely","year":"2014","unstructured":"McNeely, C. L., & Hahm, J. O. (2014). The big (data) bang: Policy, prospects, and challenges. Review of Policy Research, 31(4), 304\u2013310. doi: 10.1111\/ropr.12082 .","journal-title":"Review of Policy Research"},{"key":"9426_CR112","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1177\/154193120404800209","volume":"48","author":"Anne-Sophie Melenhorst","year":"2004","unstructured":"Melenhorst, Anne-Sophie, Arthur D Fisk, Elizabeth D Mynatt, & Wendy A Rogers (2004). Potential intrusiveness of aware home technology: perceptions of older adults. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 48, 266\u2013270. doi: 10.1177\/154193120404800209 .","journal-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting"},{"key":"9426_CR113","unstructured":"Mitseva, A., Wardana, S. A., & Prasad, N. R. (2008). Context-aware privacy protection for wireless sensor networks in hybrid hierarchical architecture. In 773\u201378. International Wireless Communications and Mobile Computing Conference, IWCMC 2008. Crete. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-52949130679&partnerID=40&md5=13e5c8cf6189923271c4ac6b216388e2 ."},{"key":"9426_CR114","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716679679","author":"B Mittelstadt","year":"2016","unstructured":"Mittelstadt, B., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society. doi: 10.1177\/2053951716679679 .","journal-title":"Big Data & Society"},{"key":"9426_CR115","unstructured":"Mittelstadt, B., Fairweather, N. B., McBride, N., Shaw, M. (2011). Ethical issues of personal health monitoring: A literature review. In ETHICOMP 2011 Conference Proceedings, 313\u2013321. Sheffield, UK."},{"key":"9426_CR116","unstructured":"Mittelstadt, B., Fairweather, N. B., McBride, N., Shaw, M. (2013). Privacy, risk and personal health monitoring. In ETHICOMP 2013 Conference Proceedings, (340\u2013351). Kolding, Denmark."},{"issue":"2","key":"9426_CR117","doi-asserted-by":"crossref","first-page":"37","DOI":"10.4018\/ijt.2014070104","volume":"5","author":"B Mittelstadt","year":"2014","unstructured":"Mittelstadt, B., Fairweather, N. B., Shaw, M., McBride, N. (2014). The ethical implications of personal health monitoring. International Journal of Technoethics, 5(2), 37\u201360.","journal-title":"International Journal of Technoethics"},{"issue":"2","key":"9426_CR118","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11948-015-9652-2","volume":"22","author":"B Mittelstadt","year":"2016","unstructured":"Mittelstadt, B., Floridi, L. (2016). The ethics of big data: Current and foreseeable issues in biomedical contexts. Science and Engineering Ethics, 22(2), 303\u2013341. doi: 10.1007\/s11948-015-9652-2 .","journal-title":"Science and Engineering Ethics"},{"key":"9426_CR119","unstructured":"Monahan, T., Wall, T. (2007). Somatic surveillance: Corporeal Control through information networks. SSOAR. http:\/\/nbn-resolving.de\/urn:nbn:de:0168-ssoar-64160 ."},{"key":"9426_CR120","unstructured":"Moncrieff, S., Venkatesh, S., & West, G. (2009). A framework for the design of privacy preserving pervasive healthcare. In 1696\u20131699. IEEE International Conference on Multimedia and Expo, ICME 2009. New York. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-70449589964&partnerID=40&md5=5fb4b46981d67f1d9a8d9387fd336acb ."},{"issue":"1","key":"9426_CR121","first-page":"25","volume":"125","author":"DB Morris","year":"1996","unstructured":"Morris, D. B (1996). About suffering: Voice, genre, and moral community. Daedalus, 125(1), 25\u201345.","journal-title":"Daedalus"},{"key":"9426_CR122","unstructured":"Nefti, S., Manzoor, U., & Manzoor, S. (2010). Cognitive agent based intelligent warning system to monitor patients suffering from dementia using ambient assisted living. In 92\u201397. 2010 International Conference on Information Society, i-Society 2010. London. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-80053373735&partnerID=40&md5=bd698fa210589c797f3dac10374cba8f ."},{"issue":"3","key":"9426_CR123","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1023\/B:BTTJ.0000047127.01462.49","volume":"22","author":"I Neild","year":"2004","unstructured":"Neild, I., Heatley, D. J. T., Kalawsky, R. S., & Bowman, P. A. (2004). Sensor networks for continuous health monitoring. BT Technology Journal, 22(3), 130\u2013139. doi: 10.1023\/B:BTTJ.0000047127.01462.49 .","journal-title":"BT Technology Journal"},{"issue":"4","key":"9426_CR124","doi-asserted-by":"publisher","first-page":"505","DOI":"10.2501\/IJMR-2013-015","volume":"55","author":"D Nunan","year":"2013","unstructured":"Nunan, D., Di Domenico, M. (2013). Market research and the ethics of big data. International Journal of Market Research, 55(4), 505. doi: 10.2501\/IJMR-2013-015 .","journal-title":"International Journal of Market Research"},{"key":"9426_CR125","unstructured":"Oboler, Andre, Welsh, K., & Cruz, L. (2012). The danger of big data: Social media as computational social science. First Monday. https:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-84867308941&partnerID=40&md5=0e4cb2f657154c7f82a76c2a657259ab ."},{"key":"9426_CR126","unstructured":"Ojasalo, J., Sepp\u00e4l\u00e4, H., Suomalainen, N. & Moonen, R. (2010). Better technologies and services for smart homes of disabled people: Empirical findings from an explorative study among intellectually disabled. In 1:V1251\u20131259. 2nd International Conference on Software Technology and Engineering, ICSTE 2010. San Juan, PR. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-78650035878&partnerID=40&md5=626a633c724af05d2d9953c4e5908d0a ."},{"key":"9426_CR127","unstructured":"Pallapa, G., Roy, N., & Das, S. (2007). Precision: Privacy enhanced context-aware information fusion in ubiquitous healthcare. In ICSE 2007 Workshops: First International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments, SEPCASE\u201907. Minneapolis, MN. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-38549097246&partnerID=40&md5=8fad28c8c1b83c25305adc6779428e19 ."},{"key":"9426_CR128","doi-asserted-by":"publisher","DOI":"10.1007\/s10728-011-0199-3","author":"E Palm","year":"2011","unstructured":"Palm, E. (2011). Who cares? Moral obligations in formal and informal care provision in the light of ICT-based home care. Health Care Analysis. doi: 10.1007\/s10728-011-0199-3 .","journal-title":"Health Care Analysis"},{"key":"9426_CR129","first-page":"105","volume":"187","author":"E Palm","year":"2012","unstructured":"Palm, E., Nordgren, A., Verweij, M., & Collste, G. (2012). Ethically sound technology? Guidelines for interactive ethical assessment of personal health monitoring. Studies in Health Technology and Informatics, 187, 105\u2013114.","journal-title":"Studies in Health Technology and Informatics"},{"issue":"6","key":"9426_CR130","doi-asserted-by":"publisher","first-page":"1873","DOI":"10.1109\/JBHI.2015.2461555","volume":"19","author":"CF Pasluosta","year":"2015","unstructured":"Pasluosta, C. F., Gassner, H., Winkler, J., Klucken, J., & Eskofier, B. M. (2015). An emerging era in the management of Parkinson\u2019s disease: Wearable technologies and the internet of things. IEEE Journal of Biomedical and Health Informatics, 19(6), 1873\u20131881. doi: 10.1109\/JBHI.2015.2461555 .","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"key":"9426_CR131","unstructured":"Patterson, M. E., Williams, D. R. (2002). Collecting and analyzing qualitative data: hermeneutic principles, methods and case examples (Vol.\u00a09). Advances in Tourism Application Series. Champaign, IL: Sagamore Publishing, Inc. http:\/\/www.treesearch.fs.fed.us\/pubs\/29421 ."},{"issue":"6","key":"9426_CR132","first-page":"378","volume":"69","author":"Edmund D Pellegrino","year":"2002","unstructured":"Pellegrino, Edmund D (2002). \u2018Professionalism, Profession and the Virtues of the Good Physician\u2019. The Mount Sinai Journal of Medicine, 69(6), 378\u2013384.","journal-title":"The Mount Sinai Journal of Medicine"},{"key":"9426_CR133","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195082890.001.0001","volume-title":"The Virtues in Medical Practice","author":"ED Pellegrino","year":"1993","unstructured":"Pellegrino, E. D., Thomasma, D. C. (1993). The Virtues in Medical Practice. New York: Oxford University Press."},{"key":"9426_CR134","first-page":"85","volume":"93","author":"SR Peppet","year":"2014","unstructured":"Peppet, S. R. (2014). Regulating the internet of things: First steps toward managing discrimination, privacy, security and consent. Texas Law Review, 93, 85.","journal-title":"Texas Law Review"},{"key":"9426_CR135","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1177\/0261018306068480","volume":"26","author":"J Percival","year":"2006","unstructured":"Percival, J., & Hanson, J. (2006). Big brother or brave new world? Telecare and its implications for older people\u2019s independence and social inclusion. Critical Social Policy, 26, 888\u2013909. doi: 10.1177\/0261018306068480 .","journal-title":"Critical Social Policy"},{"key":"9426_CR136","doi-asserted-by":"crossref","DOI":"10.1215\/9780822387916","volume-title":"Global pharmaceuticals: Ethics, markets, practices","author":"A Petryna","year":"2006","unstructured":"Petryna, A., Lakoff, A., Kleinman, A. (2006). Global pharmaceuticals: Ethics, markets, practices. Durham, NC: Duke University Press."},{"key":"9426_CR137","unstructured":"Population Reference Bureau. (2012). Fact sheet: World population trends 2012. http:\/\/www.prb.org\/Publications\/Datasheets\/2012\/world-population-data-sheet\/fact-sheet-world-population.aspx ."},{"key":"9426_CR138","unstructured":"Rashid, U., Schmidtke, H., & Woo, N. (2007). Managing disclosure of personal health information in smart home healthcare. In Vol.\u00a04555 LNCS. 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Beijing. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-38149103634&partnerID=40&md5=6e8a9a957ac835d8d2ce6949be2b3a71 ."},{"key":"9426_CR139","doi-asserted-by":"publisher","first-page":"200","DOI":"10.3109\/17538157.2010.528649","volume":"35","author":"H Remmers","year":"2010","unstructured":"Remmers, H. (2010). Environments for ageing, assistive technology and self-determination: ethical perspectives. Informatics for Health and Social Care, 35, 200\u2013210. doi: 10.3109\/17538157.2010.528649 .","journal-title":"Informatics for Health and Social Care"},{"key":"9426_CR140","first-page":"41","volume":"66","author":"NM Richards","year":"2013","unstructured":"Richards, N. M., King, J. H. (2013). Three paradoxes of big data. Stanford Law Review Online, 66, 41.","journal-title":"Stanford Law Review Online"},{"key":"9426_CR141","doi-asserted-by":"publisher","first-page":"S349","DOI":"10.1016\/j.ijmedinf.2007.03.002","volume":"76","author":"M Rigby","year":"2007","unstructured":"Rigby, M. (2007). Applying emergent ubiquitous technologies in health: The need to respond to new challenges of opportunity, expectation, and responsibility. International Journal of Medical Informatics, 76, S349\u2013S352. doi: 10.1016\/j.ijmedinf.2007.03.002 .","journal-title":"International Journal of Medical Informatics"},{"key":"9426_CR142","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1080\/13698570701612774","volume":"9","author":"L Robinson","year":"2007","unstructured":"Robinson, L., Hutchings, D., Corner, L., Finch, T., Hughes, J., Brittain, K., & Bond, J. (2007). Balancing rights and risks: Conflicting perspectives in the management of wandering in dementia. Health, Risk and Society, 9, 389\u2013406. doi: 10.1080\/13698570701612774 .","journal-title":"Health, Risk and Society"},{"key":"9426_CR143","unstructured":"Roush, C. V., Cox, J. E. (2000). The meaning of home: How It shapes the practice of home and hospice care. Home Healthcare Nurse\u2019 http:\/\/journals.lww.com\/homehealthcarenurseonline\/Fulltext\/2000\/06000\/The_Meaning_of_Home__How_It_Shapes_the_Practice_of.15.aspx ."},{"issue":"6","key":"9426_CR144","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s10916-016-0509-2","volume":"40","author":"A Sajid","year":"2016","unstructured":"Sajid, A., Abbas, H. (2016). Data privacy in cloud-assisted healthcare systems: state of the art and future challenges. Journal of Medical Systems, 40(6), 155. doi: 10.1007\/s10916-016-0509-2 .","journal-title":"Journal of Medical Systems"},{"issue":"7","key":"9426_CR145","doi-asserted-by":"publisher","first-page":"e1002616","DOI":"10.1371\/journal.pcbi.1002616","volume":"8","author":"M Salath\u00e9","year":"2012","unstructured":"Salath\u00e9, M., Bengtsson, L., Bodnar, T. J., Brewer, D. D., Brownstein, J. S., Buckee, C., et al. (2012). Digital epidemiology. PLoS Computational Biology, 8(7), e1002616. doi: 10.1371\/journal.pcbi.1002616 .","journal-title":"PLoS Computational Biology"},{"key":"9426_CR146","unstructured":"Salih, R. M., Othmane, L. B., & Lilien, L. (2011). Privacy protection in pervasive healthcare monitoring systems with active bundles. In 311\u2013315. 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops, ISPAW 2011\u20132011, ICASE 2011, SGH 2011, GSDP 2011. Busan. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-80051985951&partnerID=40&md5=313835fb53e08a59bd7ac0c0fc297dd8 ."},{"key":"9426_CR147","unstructured":"Schmidt, S., Verweij, B. (2013). The PHM-ethics methodology. In Interdisciplinary Assessment of Personal Health Monitoring, 13\u201320. Studies in Health Technology and Informatics 187. Amsterdam: IOS Press."},{"key":"9426_CR148","unstructured":"Srinivasan, V., Stankovic, J., & Whitehouse, K. (2008). Protecting your daily in-home activity information from a wireless snooping attack. In 202\u2013211. 10th International Conference on Ubiquitous Computing, UbiComp 2008. Seoul. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-59249104484&partnerID=40&md5=1e281ed890df7c05a3a8635431665534 ."},{"key":"9426_CR149","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1016\/j.ijmedinf.2009.08.001","volume":"78","author":"R Steele","year":"2009","unstructured":"Steele, R., Lo, A., Secombe, C., & Wong, Y. K. (2009). Elderly persons\u2019 perception and acceptance of using wireless sensor networks to assist healthcare. International Journal of Medical Informatics, 78, 788\u2013801.","journal-title":"International Journal of Medical Informatics"},{"key":"9426_CR150","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.eurger.2010.04.002","volume":"1","author":"S Stowe","year":"2010","unstructured":"Stowe, S., & Harding, S. (2010). Telecare, telehealth and telemedicine. European Geriatric Medicine, 1, 193\u2013197. doi: 10.1016\/j.eurger.2010.04.002 .","journal-title":"European Geriatric Medicine"},{"key":"9426_CR151","doi-asserted-by":"crossref","unstructured":"Stuart, E., Moh, M., & Moh T. S. (2008). Privacy and security in biomedical applications of wireless sensor networks. In Applied Sciences on Biomedical and Communication Technologies, 2008. ISABEL\u201908. First International Symposium on IEEE, (pp. 1\u20135).","DOI":"10.1109\/ISABEL.2008.4712575"},{"issue":"4","key":"9426_CR152","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1007\/s11019-013-9468-2","volume":"16","author":"RM StutzkiWeber","year":"2013","unstructured":"Stutzki, R., Weber, M. Reiter-Theil, S. (2013). Finding their voices again: A media project offers a floor for vulnerable patients, clients and the socially deprived. Medicine, Health Care and Philosophy, 16(4), 739\u2013750. doi: 10.1007\/s11019-013-9468-2 .","journal-title":"Medicine, Health Care and Philosophy"},{"key":"9426_CR153","unstructured":"Subramaniam, C., Ravi, A., Nayak, A., & Thunuguntla, S. (2010). Actor based domain specific privacy model for U-healthcare system. In 381\u2013385. 6th International Conference on Digital Content, Multimedia Technology and Its Applications, IDC2010. Seoul. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-77958029155&partnerID=40&md5=09d269edcb98a5d863e1069adb159f71 ."},{"issue":"3","key":"9426_CR154","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s12130-010-9113-9","volume":"23","author":"M Taddeo","year":"2010","unstructured":"Taddeo, M. (2010a). Trust in technology: a distinctive and a problematic relation. Knowledge, Technology & Policy, 23(3), 283\u2013286.","journal-title":"Knowledge, Technology & Policy"},{"issue":"2","key":"9426_CR155","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s11023-010-9201-3","volume":"20","author":"M Taddeo","year":"2010","unstructured":"Taddeo M. (2010b). Modelling Trust in artificial agents, a first step toward the analysis of e-trust. Minds and Machines, 20(2), 243\u2013257. doi: 10.1007\/s11023-010-9201-3 .","journal-title":"Minds and Machines"},{"issue":"2083","key":"9426_CR156","doi-asserted-by":"publisher","first-page":"20160113","DOI":"10.1098\/rsta.2016.0113","volume":"374","author":"M Taddeo","year":"2016","unstructured":"Taddeo, M. (2016). Data philanthropy and the design of the infraethics for information societies. Philosophical Transactions of the Royal Society A, 374(2083), 20160113. doi: 10.1098\/rsta.2016.0113 .","journal-title":"Philosophical Transactions of the Royal Society A"},{"issue":"1","key":"9426_CR157","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10676-010-9263-1","volume":"13","author":"M Taddeo","year":"2011","unstructured":"Taddeo, M., Floridi, L. (2011). The case for E-trust. Ethics and Information Technology, 13(1), 1\u20133.","journal-title":"Ethics and Information Technology"},{"key":"9426_CR158","unstructured":"Tene, O., Polonetsky, J. (2013). Big data for all: Privacy and user control in the age of analytics. Northwestern Journal of Technology & Intellectual Property. http:\/\/heinonlinebackup.com\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/nwteintp11&section=20 ."},{"issue":"3","key":"9426_CR159","first-page":"252","volume":"12","author":"M Tentori","year":"2006","unstructured":"Tentori, M., Favela, J., Gonz\u00e1lez, V. M. (2006). Quality of privacy (QoP) for the design of ubiquitous healthcare applications. Journal of Universal Computer Science, 12(3), 252\u2013269.","journal-title":"Journal of Universal Computer Science"},{"issue":"12","key":"9426_CR160","doi-asserted-by":"publisher","first-page":"2317","DOI":"10.1101\/gr.096651.109","volume":"19","author":"J Peterson","year":"2009","unstructured":"The NIH HMP Working Group, Peterson, J., Garges, S., Giovanni, M., McInnes, P., Wang, L., et al. (2009). The NIH human microbiome project. Genome Research, 19(12), 2317\u20132323. doi: 10.1101\/gr.096651.109 .","journal-title":"Genome Research"},{"key":"9426_CR161","unstructured":"Tiwari, P., Warren, J., Day, K. J., & McDonald, B. (2010). Some non-technology implications for wider application of robots assisting older people. Health Care and Informatics Review Online 14. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-77954871749&partnerID=40&md5=3557bb5e0d8464c12be74e104ddc0e79 ."},{"key":"9426_CR162","doi-asserted-by":"crossref","unstructured":"Townsend, D., Knoefel, F., & Goubran, R. (2011). Privacy versus Autonomy: A Tradeoff Model for Smart Home Monitoring Technologies. In Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS (pp. 4749\u20134752).","DOI":"10.1109\/IEMBS.2011.6091176"},{"key":"9426_CR163","unstructured":"United Nations. (2008). World population prospects\u2014The 2008 revision\u2019. Department of Economic and Social Affairs\u2014Population Division. http:\/\/www.un.org\/esa\/population\/publications\/wpp2008\/wpp2008_highlights.pdf ."},{"key":"9426_CR43","doi-asserted-by":"crossref","unstructured":"van De Garde-Perik, E., Markopoulos, P., & De Ruyter, B. 2006. On the relative importance of privacy guidelines for ambient health care. In 189:377\u2013380. NordiCHI 2006: 4th Nordic Conference on Human-Computer Interaction\u2014Changing Roles. Oslo. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-34547236121&partnerID=40&md5=4062eeeeeda1e81c5a8d4adf5c45da72 .","DOI":"10.1145\/1182475.1182516"},{"key":"9426_CR164","doi-asserted-by":"publisher","unstructured":"van Hoof, J., De Kort, H.S.M., Markopoulos, P., & Soede, M. (2007). Ambient intelligence, ethics and privacy. Gerontechnology, 6(3). doi: 10.4017\/gt.2007.06.03.005.00 .","DOI":"10.4017\/gt.2007.06.03.005.00"},{"key":"9426_CR165","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1016\/j.ijmedinf.2011.02.010","volume":"80","author":"J Hoof van","year":"2011","unstructured":"van Hoof, J., Kort, H. S. M., Rutten, P. G. S., & Duijnstee, M. S. H. (2011). Ageing-in-place with the use of ambient intelligence technology: Perspectives of older users. International Journal of Medical Informatics, 80, 310\u2013331.","journal-title":"International Journal of Medical Informatics"},{"key":"9426_CR166","unstructured":"Wachter, S. (2017). Privacy: Primus inter pares\u2014privacy as a precondition for self-development, personal fulfilment and the free enjoyment of fundamental human rights\u2019. SSRN Scholarly Paper ID 2903514. Rochester, NY: Social Science Research Network. https:\/\/papers.ssrn.com\/abstract=2903514 ."},{"key":"9426_CR167","doi-asserted-by":"crossref","unstructured":"Wachter, S., Mittelstadt, B., Floridi, L. (2017a). Why a right to explanation of automated decision-making does not exist in the general data protection regulation. International Data Privacy Law. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2903469 .","DOI":"10.2139\/ssrn.2903469"},{"key":"9426_CR168","doi-asserted-by":"crossref","first-page":"eaan6080","DOI":"10.1126\/scirobotics.aan6080","volume":"2","author":"S Wachter","year":"2017","unstructured":"Wachter, S., Mittelstadt, B., Floridi, L. (2017b). Transparent, explainable, and accountable AI for robotics. Science Robotics, 2, eaan6080.","journal-title":"Science Robotics"},{"key":"9426_CR169","doi-asserted-by":"publisher","unstructured":"Wang, Kai, Yan Sui, Xukai Zou, Durresi, A., & Shiaofen Fang. 2008. \u2018Pervasive and trustworthy healthcare\u2019. In Advanced Information Networking and Applications\u2014Workshops, 2008. AINAW 2008. 22nd International Conference on IEEE, (pp. 750\u2013755). doi: 10.1109\/WAINA.2008.147 .","DOI":"10.1109\/WAINA.2008.147"},{"issue":"9","key":"9426_CR170","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1038\/nrc2913","volume":"10","author":"RWG Watson","year":"2010","unstructured":"Watson, R. W. G., Kay, E. W. & Smith, D. (2010). \u2018Integrating biobanks: Addressing the practical and ethical issues to deliver a valuable tool for cancer research\u2019. Nature Reviews Cancer, 10(9), 646\u2013651. doi: 10.1038\/nrc2913 .","journal-title":"Nature Reviews Cancer"},{"key":"9426_CR171","unstructured":"Wilkowska, W., Gaul, S., & Ziefle, M. 2010. A small but significant difference\u2014the role of gender on acceptance of medical assistive technologies. In Vol.\u00a06389 LNCS. 6th Symposium of the Workgroup Human-Computer Interaction and Usability Engineering, USAB 2010. Klagenfurt. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-78649935702&partnerID=40&md5=9b824c5ddfd552b4593e346417ff411f ."},{"key":"9426_CR172","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.archger.2011.02.003","volume":"54","author":"YH Wu","year":"2012","unstructured":"Wu, Y. H., Fassert, C., Rigaud, A. S. (2012). Designing robots for the elderly: Appearance issue and beyond. Archives of Gerontology and Geriatrics, 54, 121\u2013126. doi: 10.1016\/j.archger.2011.02.003 .","journal-title":"Archives of Gerontology and Geriatrics"},{"key":"9426_CR173","doi-asserted-by":"crossref","unstructured":"Yuan, W., Guan, D., Lee, S., & Lee, Y. K. (2007). The role of trust in ubiquitous healthcare. In, 312\u2013315. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-34748858124&partnerID=40&md5=07bdb12a37bc100b17efe7bd20f70713 .","DOI":"10.1109\/HEALTH.2007.381660"},{"key":"9426_CR174","unstructured":"Ziefle, M., R\u00f6cker, C., & Holzinger, A. (2011). Medical technology in smart homes: Exploring the user\u2019s perspective on privacy, intimacy and trust. In 410\u2013415. http:\/\/www.scopus.com\/inward\/record.url?eid=2-s2.0-80054976685&partnerID=40&md5=6f08c26340ba83a66f048771302be6eb ."},{"key":"9426_CR175","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1080\/13607863.2010.543662","volume":"15","author":"SA Zwijsen","year":"2011","unstructured":"Zwijsen, S. A., Niemeijer, A. R., & Hertogh, C. M. (2011). Ethics of using assistive technology in the care for community-dwelling elderly people: An overview of the literature. Aging and Mental Health, 15, 419\u2013427. doi: 10.1080\/13607863.2010.543662 .","journal-title":"Aging and Mental Health"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-017-9426-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-017-9426-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-017-9426-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T03:45:05Z","timestamp":1750477505000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-017-9426-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,4]]},"references-count":173,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["9426"],"URL":"https:\/\/doi.org\/10.1007\/s10676-017-9426-4","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,4]]}}}