{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:33:50Z","timestamp":1772040830732,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,1,27]],"date-time":"2018-01-27T00:00:00Z","timestamp":1517011200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/M001636\/1"],"award-info":[{"award-number":["EP\/M001636\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N028260\/1"],"award-info":[{"award-number":["EP\/N028260\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/M02315X\/1"],"award-info":[{"award-number":["EP\/M02315X\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1007\/s40860-018-0054-5","type":"journal-article","created":{"date-parts":[[2018,1,27]],"date-time":"2018-01-27T01:44:30Z","timestamp":1517017470000},"page":"39-55","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":62,"title":["Building accountability into the Internet of Things: the IoT Databox model"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5553-6767","authenticated-orcid":false,"given":"Andy","family":"Crabtree","sequence":"first","affiliation":[]},{"given":"Tom","family":"Lodge","sequence":"additional","affiliation":[]},{"given":"James","family":"Colley","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Greenhalgh","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Glover","sequence":"additional","affiliation":[]},{"given":"Hamed","family":"Haddadi","sequence":"additional","affiliation":[]},{"given":"Yousef","family":"Amar","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Mortier","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]},{"given":"John","family":"Moore","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Poonam","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Jianxin","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Brown","sequence":"additional","affiliation":[]},{"given":"Lachlan","family":"Urquhart","sequence":"additional","affiliation":[]},{"given":"Derek","family":"McAuley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,27]]},"reference":[{"key":"54_CR1","doi-asserted-by":"crossref","unstructured":"Amar Y, Haddadi H, Mortier R (2016) Privacy-aware infrastructure for managing personal data. In: Proceedings of SIGCOMM, Florian\u00f3polis, ACM, pp 571\u2013572","DOI":"10.1145\/2934872.2959054"},{"key":"54_CR2","doi-asserted-by":"crossref","unstructured":"Chaudry A, Crowcroft J, Howard H, Madhavapeddy A, Mortier R, Haddadi H, McAuley D (2015) Personal data: thinking inside the box. In: Proceedings of critical alternatives, Aarhus, ACM, pp 29\u201332","DOI":"10.7146\/aahcc.v1i1.21312"},{"key":"54_CR3","unstructured":"Chiang M, Shi W (2016) NSF workshop report on grand challenges in edge computing. \n                    http:\/\/iot.eng.wayne.edu\/edge\/NSF%20Edge%20Workshop%20Report.pdf\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR4","doi-asserted-by":"crossref","unstructured":"Crabtree A, Mortier R (2015) Human data interaction: historical lessons from social studies and CSCW. In: Proceedings of ECSCW, Springer, Oslo, pp 1\u201320","DOI":"10.1007\/978-3-319-20499-4_1"},{"key":"54_CR5","unstructured":"Databox, \n                    https:\/\/www.databoxproject.uk\/code\/"},{"issue":"4","key":"54_CR6","first-page":"5","volume":"35","author":"Y Montjoye de","year":"2012","unstructured":"de Montjoye Y, Wang S, Pentland A (2012) On the trusted use of large-scale personal data. Bull IEEE Tech Comm Data Eng 35(4):5\u20138","journal-title":"Bull IEEE Tech Comm Data Eng"},{"key":"54_CR7","doi-asserted-by":"publisher","unstructured":"de Montjoye Y, Shmueli E, Wang S, Pentland A (2014) \u201copenPDS\u201d protecting the privacy of metadata through SafeAnswers., PLOS One. \n                    https:\/\/doi.org\/10.1371\/journal.pone.0098790\n                    \n                  . Accessed 18 Aug 2017","DOI":"10.1371\/journal.pone.0098790"},{"key":"54_CR8","unstructured":"Docker, \n                    https:\/\/www.docker.com\n                    \n                  . Accessed 18 Aug 2017"},{"issue":"4","key":"54_CR9","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1207\/s15327051hci1304_2","volume":"13","author":"P Dourish","year":"1998","unstructured":"Dourish P, Button G (1998) On technomethodology: foundational relationships between ethnomethodology and system design. Hum Comput Interact 13(4):395\u2013432","journal-title":"Hum Comput Interact"},{"key":"54_CR10","unstructured":"FTC Staff Report (2015) Internet of things: privacy and security in a connected World. \n                    https:\/\/www.ftc.gov\/system\/files\/documents\/reports\/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy\/150127iotrpt.pdf\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR11","unstructured":"Gellman R (2016) Fair information practices: a basic history. \n                    https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2415020\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR12","unstructured":"General Data Protection Regulation (2016) Official Journal of the European Union, vol 59, pp 1\u201388"},{"key":"54_CR13","unstructured":"Harper J (2016) The necessity of edge computing with the internet of things. \n                    https:\/\/analyticsweek.com\/content\/the-necessity-of-edge-computing-with-the-internet-of-things\/\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR14","unstructured":"ICLG (2017) Data Protection 2017 USA. \n                    https:\/\/iclg.com\/practice-areas\/data-protection\/data-protection-2017\/usa\n                    \n                  . Accessed 09 Aug 2017"},{"key":"54_CR15","unstructured":"ICO (2017) Accountability and Governance. \n                    https:\/\/ico.org.uk\/for-organisations\/data-protection-reform\/overview-of-the-gdpr\/accountability-and-governance\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR16","unstructured":"ICO, Processing Personal Data Fairly and Lawfully (Principle 1), \n                    https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/principle-1-fair-and-lawful\/\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR17","unstructured":"Larsen R, Brochot G, Lewis D, Eisma F, Brunini J (2015) Personal data stores. \n                    https:\/\/ec.europa.eu\/digital-agenda\/en\/news\/study-personal-data-stores-conducted-cambridge-university-judge-business-school\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR18","doi-asserted-by":"crossref","unstructured":"Mahmud R, Buyya R (to appear) Fog computing: a taxonomy, survey and future directions. In: Di Martino B, Li KC, Yang L, Esposito A (Eds), Internet of everything: algorithms, methodologies, technologies and perspectives, Springer, Singapore. \n                    https:\/\/arxiv.org\/pdf\/1611.05539.pdf\n                    \n                  . Accessed 18 Aug 2017","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"54_CR19","doi-asserted-by":"crossref","unstructured":"McAuley D, Mortier R, Goulding J (2011) The dataware manifesto. In: Proceedings of the 3rd international conference on communication systems and networks, Bangalore, IEEE, pp 1\u20136","DOI":"10.1109\/COMSNETS.2011.5716491"},{"key":"54_CR20","unstructured":"McKinsey Global (2015) The internet of things: mapping the value beyond the hype. \n                    http:\/\/www.mckinsey.com\/~\/media\/McKinsey\/Business%20Functions\/McKinsey%20Digital\/Our%20Insights\/The%20Internet%20of%20Things%20The%20value%20of%20digitizing%20the%20physical%20world\/The-Internet-of-things-Mapping-the-value-beyond-the-hype.ashx\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR21","doi-asserted-by":"crossref","unstructured":"Mortier R, Zhao J, Crowcroft J, Qi\u00a0Li LW, Haddadi H, Amar Y, Crabtree A, Colley J, Lodge T, Brown A, McAuley D, Greenhalgh C (2016) Personal data management with the Databox: what\u2019s inside the box? In: Proceedings of the ACM workshop on cloud-assisted networking, Irvine, ACM, pp 49\u201354","DOI":"10.1145\/3010079.3010082"},{"issue":"1","key":"54_CR22","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/2541883.2541895","volume":"57","author":"A Mudhavapeddy","year":"2014","unstructured":"Mudhavapeddy A, Scott D (2014) Unikernels: the rise of the virtual library operating system. Commun ACM 57(1):61\u201369","journal-title":"Commun ACM"},{"key":"54_CR23","unstructured":"Mydex, \n                    https:\/\/mydex.org\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR24","unstructured":"Node Red, \n                    https:\/\/nodered.org\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR25","unstructured":"Poikola A, Kuikkaniemi K, Honko H (2015) MyData\u2014a nordic model for human-centered personal data management and processing. \n                    http:\/\/urn.fi\/URN:ISBN:978-952-243-455-5\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR26","doi-asserted-by":"crossref","unstructured":"Robertson T, Wagner I (2015) CSCW and the internet of things. In: Proceedings of ECSCW, Springer, Oslo, pp 285\u2013294","DOI":"10.1007\/978-3-319-20499-4_15"},{"key":"54_CR27","unstructured":"Singer N (2016) Why a push for online privacy is bogged down in Washington. New York Times \n                    https:\/\/www.nytimes.com\/2016\/02\/29\/technology\/obamas-effort-on-consumer-privacy-falls-short-critics-say.html\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR28","unstructured":"Strategic Headquarters for the Promotion of an Advanced Information and Telecommunications Network Society (2014) Policy outline of the institutional revision for utilization of personal data. \n                    http:\/\/japan.kantei.go.jp\/policy\/it\/20140715_2.pdf\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR29","unstructured":"SWD (2016) 110 Final Advancing the Internet of Things in Europe. \n                    http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:52016SC0110&from=EN\n                    \n                  . Accessed 18 Aug 2017"},{"issue":"5","key":"54_CR30","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Int Thing J 3(5):637\u2013646","journal-title":"IEEE Int Thing J"},{"key":"54_CR31","unstructured":"WP173 (2010) Opinion 3\/2010 on the principle of accountability. Article 29 Data Protection Working Party \n                    http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2010\/wp173_en.pdf\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR32","unstructured":"WP202 (2013) Opinion 02\/2013 on apps and smart devices. Article 29 Data Protection Working Party. \n                    http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2013\/wp202_en.pdf\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR33","unstructured":"WP203 (2013) Opinion 03\/2013 on purpose limitation. Article 29 Data Protection Working Party. \n                    http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2013\/wp203_en.pdf\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR34","unstructured":"WP233 (2014) Opinion 8\/2014 on recent developments on the internet of things. Article 29 Data Protection Working Party, \n                    http:\/\/www.dataprotection.ro\/servlet\/ViewDocument?id=1088\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR35","unstructured":"WP248 (2016) Guidelines on data protection impact assessment. Article 29 Data Protection Working Party. \n                    http:\/\/ec.europa.eu\/newsroom\/document.cfm?doc_id=44137\n                    \n                  . Accessed 18 Aug 2017"},{"key":"54_CR36","unstructured":"Ward P (2015) Hub of all things. Digital Leaders, British Computer Society, pp 58\u201359"},{"key":"54_CR37","unstructured":"World Economic Forum (2014) Rethinking personal data: a new lens for strengthening trust. \n                    http:\/\/www3.weforum.org\/docs\/WEF_RethinkingPersonalData_ANewLens_Report_2014.pdf\n                    \n                  . Accessed 18 Aug 2017"},{"issue":"12","key":"54_CR38","doi-asserted-by":"publisher","first-page":"2728","DOI":"10.1002\/sec.795","volume":"7","author":"J Ziegeldorf","year":"2014","unstructured":"Ziegeldorf J, Morchon O, Wehrle K (2014) Privacy in the internet of things: threats and challenges. Secur Commun Netw 7(12):2728\u20132742","journal-title":"Secur Commun Netw"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-018-0054-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-018-0054-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-018-0054-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,26]],"date-time":"2019-01-26T19:48:32Z","timestamp":1548532112000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-018-0054-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,27]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["54"],"URL":"https:\/\/doi.org\/10.1007\/s40860-018-0054-5","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,27]]},"assertion":[{"value":"25 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}