{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:38:15Z","timestamp":1743129495457,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030726591"},{"type":"electronic","value":"9783030726607"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-72660-7_38","type":"book-chapter","created":{"date-parts":[[2021,3,28]],"date-time":"2021-03-28T07:02:28Z","timestamp":1616914948000},"page":"390-400","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Role of Customers and Their Privacy in an IoT Business Context"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3085-1562","authenticated-orcid":false,"given":"Carlos R.","family":"Cunha","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9308-0027","authenticated-orcid":false,"given":"Jo\u00e3o Pedro","family":"Gomes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7531-9070","authenticated-orcid":false,"given":"Arlindo","family":"Santos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1923-2341","authenticated-orcid":false,"given":"Elisabete Paulo","family":"Morais","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,29]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Zimmermann, A.,\u00a0Schmidt, R., Sandkuhl, K., Wi\u00dfotzki, M., Jugel, D., M\u00f6hring, M.: Digital enterprise architecture-transformation for the internet of things. In: IEEE 19th International Enterprise Distributed Object Computing Workshop. IEEE (2015)","DOI":"10.1109\/EDOCW.2015.16"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Okazaki, S., Eisend, M., Plangger, K., Ruyter, K., Grewal, D.: Understanding the strategic consequences of customer privacy concerns: a meta-analytic review. J. Retail. (2020). ISSN 0022-4359","DOI":"10.1016\/j.jretai.2020.05.007"},{"key":"38_CR3","unstructured":"Schneider, M.J., Jagpal, S., Gupta, S., Li, S., Yu, Y.: Protecting customer privacy when marketing with second-party data. Int. J. Res. Mark. 34(3), 593\u2013603 (2017). ISSN 0167-8116"},{"key":"38_CR4","doi-asserted-by":"publisher","first-page":"4102","DOI":"10.3390\/app10124102","volume":"10","author":"L Tawalbeh","year":"2020","unstructured":"Tawalbeh, L., Muheidat, F., Tawalbeh, M., Quwaider, M.: IoT privacy and security: challenges and solutions. Appl. Sci. 10, 4102 (2020)","journal-title":"Appl. Sci."},{"key":"38_CR5","doi-asserted-by":"publisher","unstructured":"Virat, M.S., Bindu, S.M., Aishwarya, B., Dhanush, B.N., Kounte, M.R.: Security and privacy challenges in internet of things. In: 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, pp. 454\u2013460 (2018). https:\/\/doi.org\/10.1109\/ICOEI.2018.8553919","DOI":"10.1109\/ICOEI.2018.8553919"},{"key":"38_CR6","doi-asserted-by":"publisher","unstructured":"Gupta, S.S., Khan, M.S., Sethi, T.: Latest trends in security, privacy and trust in IOT. In: 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, pp. 382\u2013385 (2019). https:\/\/doi.org\/10.1109\/ICECA.2019.8822178","DOI":"10.1109\/ICECA.2019.8822178"},{"key":"38_CR7","doi-asserted-by":"publisher","unstructured":"Kraijak, S., Tuwanut, P.: A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends. In: 2015 IEEE 16th International Conference on Communication Technology (ICCT), Hangzhou, pp. 26\u201331 (2015). https:\/\/doi.org\/10.1109\/ICCT.2015.7399787","DOI":"10.1109\/ICCT.2015.7399787"},{"key":"38_CR8","doi-asserted-by":"publisher","first-page":"2728","DOI":"10.1002\/sec.795","volume":"7","author":"JH Ziegeldorf","year":"2014","unstructured":"Ziegeldorf, J.H., Morchon, O.G., Wehrle, K.: Privacy in the internet of things: threats and challenges, security comm. Networks 7, 2728\u20132742 (2014). https:\/\/doi.org\/10.1002\/sec.795","journal-title":"Networks"},{"key":"38_CR9","doi-asserted-by":"publisher","unstructured":"Lee, J., Kim, H.: Security and privacy challenges in the internet of things security and privacy matters. IEEE Consum. Electron. Mag. 6(3), 134\u2013136 (2017). https:\/\/doi.org\/10.1109\/MCE.2017.2685019","DOI":"10.1109\/MCE.2017.2685019"},{"key":"38_CR10","unstructured":"Mohanty, S.N., Ramya, K.C., Rani, S.S., Gupta, D., Shankar, K., Lakshmanaprabu, S.K., Khanna, A.: An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy. Future Gener. Comput. Syst. 102, 1027\u20131037 (2020). ISSN 0167-739X"},{"key":"38_CR11","doi-asserted-by":"publisher","unstructured":"Fremantle, P., Aziz, B., Kirkham, T.: Enhancing IoT Security and privacy with distributed ledgers - a position paper. In: Ramachandran, M., M\u00e9ndez Mu\u00f1oz, V., Kantere, V., Wills, G., Walters, R., Chang, V. (eds.) Proceedings of the 2nd International Conference on the Internet of Things, Big Data and Security, pp. 344\u2013349. SCITEPRESS \u2013 Science and Technology Publications (2020). https:\/\/doi.org\/10.5220\/0006353903440349","DOI":"10.5220\/0006353903440349"},{"key":"38_CR12","doi-asserted-by":"publisher","unstructured":"Ling, Z., Liu, K., Xu, Y., Jin, Y., Fu, X.: An end-to-end view of IoT security and privacy. In: GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, pp. 1\u20137https:\/\/doi.org\/10.1109\/GLOCOM.2017.8254011","DOI":"10.1109\/GLOCOM.2017.8254011"},{"key":"38_CR13","doi-asserted-by":"publisher","unstructured":"Abomhara, M., K\u00f8ien, G.M.: Security and privacy in the Internet of Things: current status and open issues. In: International Conference on Privacy and Security in Mobile Systems (PRISMS), Aalborg, pp. 1\u20138 (2014). https:\/\/doi.org\/10.1109\/PRISMS.2014.6970594","DOI":"10.1109\/PRISMS.2014.6970594"},{"key":"38_CR14","doi-asserted-by":"publisher","unstructured":"Zhou, W., Jia, Y., Peng, A., Zhang, Y., Liu, P.: The effect of IoT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved. IEEE Internet of Things J. 6(2), 1606\u20131616 (2019). https:\/\/doi.org\/10.1109\/JIOT.2018.2847733","DOI":"10.1109\/JIOT.2018.2847733"},{"key":"38_CR15","doi-asserted-by":"publisher","unstructured":"Chen, L., Thombre S., J\u00e4rvinen, K., Lohan. E.S., Al\u00e9n-Savikko, A., Lepp\u00e4koski, H., Bhuiyan and, M. Z. H., Bu-Pasha, S., Ferrara, G. N., Honkala, S., Lindqvist, J., Ruotsalainen, L., Korpisaari, P., Kuusniemi, H.: Robustness, security and privacy in location-based services for future IoT: a survey. IEEE Access 5, 8956\u20138977 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2695525","DOI":"10.1109\/ACCESS.2017.2695525"},{"key":"38_CR16","doi-asserted-by":"publisher","unstructured":"Yang, Y., Wu, L., Yin, G., Li, L. Zhao, H.: A survey on security and privacy issues in internet-of-things. IEEE Internet of Things J. 4(5), 1250\u20131258 (2017). https:\/\/doi.org\/10.1109\/JIOT.2017.2694844","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"38_CR17","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3677","author":"F Al-Turjman","year":"2019","unstructured":"Al-Turjman, F., Zahmatkesh, H., Shahroze, R.: An overview of security and privacy in smart cities\u2019 IoT communications. Trans Emerging Tel Tech (2019). https:\/\/doi.org\/10.1002\/ett.3677","journal-title":"Trans Emerging Tel Tech"},{"key":"38_CR18","doi-asserted-by":"publisher","unstructured":"Latif, S., Zafar, N. A. (2017). A survey of security and privacy issues in IoT for smart cities,\u00a0Fifth International Conference on Aerospace Science & Engineering (ICASE), Islamabad, 2017, pp. 1\u20135, doi: https:\/\/doi.org\/10.1109\/ICASE.2017.8374288.","DOI":"10.1109\/ICASE.2017.8374288"},{"key":"38_CR19","doi-asserted-by":"crossref","unstructured":"Wang, H., Jiang, X. Kambourakis, G. (2015). Special issue on Security, Privacy and Trust in network-based Big Data. Inf. Sci. Int. J. 318(C), 48\u201350.","DOI":"10.1016\/j.ins.2015.05.040"},{"key":"38_CR20","doi-asserted-by":"publisher","unstructured":"Wang, H., Zhang, Z. & Taleb, T. (2018). Editorial: Special Issue on Security and Privacy of IoT.\u00a0World Wide Web\u00a021,\u00a01\u20136. https:\/\/doi.org\/10.1007\/s11280-017-0490-9","DOI":"10.1007\/s11280-017-0490-9"},{"key":"38_CR21","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s11036-017-0835-8","volume":"23","author":"A Bujari","year":"2018","unstructured":"Bujari, A., Furini, M., Mandreoli, F., et al.: Standards, Security and Business Models: Key Challenges for the IoT Scenario. Mobile Netw Appl 23, 147\u2013154 (2018). https:\/\/doi.org\/10.1007\/s11036-017-0835-8","journal-title":"Mobile Netw Appl"},{"key":"38_CR22","first-page":"0267","volume":"4\u201315","author":"X Caron","year":"2016","unstructured":"Caron, X., Bosua, R., Maynard, S.B., Ahmad, A.: The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective, Computer Law & Security Review, 32(1). ISSN 4\u201315, 0267\u20133649 (2016)","journal-title":"ISSN"}],"container-title":["Advances in Intelligent Systems and Computing","Trends and Applications in Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-72660-7_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,28]],"date-time":"2021-03-28T07:23:56Z","timestamp":1616916236000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-72660-7_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030726591","9783030726607"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-72660-7_38","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"29 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Terceira Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 April 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}