{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T20:22:20Z","timestamp":1770236540610,"version":"3.49.0"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2009,7,16]],"date-time":"2009-07-16T00:00:00Z","timestamp":1247702400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron Markets"],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1007\/s12525-009-0016-0","type":"journal-article","created":{"date-parts":[[2011,5,24]],"date-time":"2011-05-24T19:52:16Z","timestamp":1306266736000},"page":"99-102","source":"Crossref","is-referenced-by-count":13,"title":["Preface to the focus theme section: \u2018Internet of things\u2019"],"prefix":"10.1007","volume":"19","author":[{"given":"Elgar","family":"Fleisch","sequence":"first","affiliation":[]},{"given":"Sanjay","family":"Sarma","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Thiesse","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,7,16]]},"reference":[{"key":"16_CR1","first-page":"235","volume-title":"The invisible future\u2014the seamless integration of technology in everyday life","author":"E Aarts","year":"2002","unstructured":"Aarts, E., Harwig, R., & Schuurmans, M. (2002). Ambient intelligence. In P. J. Denning (Ed.), The invisible future\u2014the seamless integration of technology in everyday life (pp. 235\u2013250). Columbus: McGraw-Hill."},{"issue":"10","key":"16_CR2","first-page":"131","volume":"83","author":"G Allmendinger","year":"2005","unstructured":"Allmendinger, G., & Lombreglia, R. (2005). Four strategies for the age of smart services. Harvard Business Review, 83(10), 131\u2013145.","journal-title":"Harvard Business Review"},{"key":"16_CR3","volume-title":"EPC information services (EPCIS) version 1.0.1 specification","author":"EPCglobal","year":"2007","unstructured":"EPCglobal. (2007). EPC information services (EPCIS) version 1.0.1 specification. Lawrenceville: EP-Cglobal."},{"issue":"1","key":"16_CR4","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/MPRV.2002.993145","volume":"1","author":"D Estrin","year":"2002","unstructured":"Estrin, D., Culler, D., Pister, K., & Sukhatme, G. (2002). Connecting the physical world with pervasive networks. IEEE Pervasive Computing, 1(1), 59\u201369.","journal-title":"IEEE Pervasive Computing"},{"issue":"6","key":"16_CR5","first-page":"138","volume":"80","author":"GT Ferguson","year":"2002","unstructured":"Ferguson, G. T. (2002). Have your objects call my objects. Harvard Business Review, 80(6), 138\u2013144.","journal-title":"Harvard Business Review"},{"issue":"2","key":"16_CR6","first-page":"1","volume":"2","author":"E Fleisch","year":"2000","unstructured":"Fleisch, E., & \u00d6sterle, H. (2000). A process-oriented approach to business networking. Electronic Journal of Organizational Virtualness, 2(2), 1\u201321.","journal-title":"Electronic Journal of Organizational Virtualness"},{"key":"16_CR7","volume-title":"Ubiquitous computing: Why auto-ID is the logical next step in enterprise automation","author":"E Fleisch","year":"2003","unstructured":"Fleisch, E., & Dierkes, M. (2003). Ubiquitous computing: Why auto-ID is the logical next step in enterprise automation. Cambridge: Auto-ID Center, MIT."},{"key":"16_CR8","volume-title":"When things start to think","author":"N Gershenfeld","year":"1999","unstructured":"Gershenfeld, N. (1999). When things start to think. New York: Holt."},{"issue":"6","key":"16_CR9","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/40.977758","volume":"21","author":"S Sarma","year":"2001","unstructured":"Sarma, S., Brock, D., & Engels, D. (2001). Radio frequency identification and the electronic product code. IEEE Micro, 21(6), 50\u201354.","journal-title":"IEEE Micro"},{"issue":"4","key":"16_CR10","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/98.943998","volume":"8","author":"M Satyanarayanan","year":"2001","unstructured":"Satyanarayanan, M. (2001). Pervasive computing: Vision and challenges. IEEE Personal Communications, 8(4), 10\u201317.","journal-title":"IEEE Personal Communications"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Thiesse, F. (2007). RFID, Privacy and the Perception of Risk. Journals of Strategic Information Systems, 16(2), 214-232.","DOI":"10.1016\/j.jsis.2007.05.006"},{"issue":"1","key":"16_CR12","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1038\/scientificamerican0104-56","volume":"290","author":"R Want","year":"2004","unstructured":"Want, R. (2004). RFID\u2014A key to automating everything. Scientific American, 290(1), 56\u201365.","journal-title":"Scientific American"},{"issue":"3","key":"16_CR13","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M Weiser","year":"1991","unstructured":"Weiser, M. (1991). The computer for the 21st century. Scientific American, 265(3), 66\u201375.","journal-title":"Scientific American"},{"issue":"10","key":"16_CR14","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/2.237456","volume":"26","author":"M Weiser","year":"1993","unstructured":"Weiser, M. (1993). Ubiquitous computing. IEEE Computer, 26(10), 71\u201372.","journal-title":"IEEE Computer"}],"container-title":["Electronic Markets"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-009-0016-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12525-009-0016-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-009-0016-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T03:58:32Z","timestamp":1560225512000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12525-009-0016-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7,16]]},"references-count":14,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2009,8]]}},"alternative-id":["16"],"URL":"https:\/\/doi.org\/10.1007\/s12525-009-0016-0","relation":{},"ISSN":["1019-6781","1422-8890"],"issn-type":[{"value":"1019-6781","type":"print"},{"value":"1422-8890","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7,16]]}}}