{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T20:23:22Z","timestamp":1778099002955,"version":"3.51.4"},"reference-count":166,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,2,4]],"date-time":"2023-02-04T00:00:00Z","timestamp":1675468800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,2,4]],"date-time":"2023-02-04T00:00:00Z","timestamp":1675468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"NTNU Norwegian University of Science and Technology"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The rapid evolution of Internet\u00a0of\u00a0Things (IoT) technologies, with ever more profound implications for humans and societies, has triggered visions and initiatives to re-align the Next-Generation IoT with what works for humans and humanity first. However, despite the increased push towards \u201chuman-centric\u201d IoT, it is still poorly understood what \u201chuman-centric\u201d actually means in this context, how it is interpreted and embedded into the design, by whom, and for which purposes. To address these questions, we conducted a systematic literature review (N = 84) on the theory, principles, and design requirements of human-centric IoT. A key observation is that, despite the recent increase in research on humane perspectives for IoT,\u00a0\u201chuman-centredness\u201d often still seems to be used primarily as a label and overarching paradigm, not leading to a profound change in the underlying practices. We found no shared understanding of what \u201chuman-centric\u201d implies in this context or common agreement on which principles human-centric IoT should be built upon. Furthermore, our analysis confirmed the predominance of technology-oriented fields, with a traditional approach towards user involvement and limited involvement of other disciplines. Overall, our findings point towards an apparent discrepancy between how contributions are positioned and framed (\u201chuman-centric\u201d), the practices and assumptions they are based on, and their actual impact and ability to orient existing efforts towards genuine human-centric outcomes and key values. Based on the results, we formulate directions for future research aimed at building a more human-centric and empowering IoT.<\/jats:p>","DOI":"10.1007\/s12652-023-04539-3","type":"journal-article","created":{"date-parts":[[2023,2,4]],"date-time":"2023-02-04T07:05:29Z","timestamp":1675494329000},"page":"2827-2859","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":52,"title":["Review of the theory, principles, and design requirements of human-centric Internet of Things (IoT)"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8427-5033","authenticated-orcid":false,"given":"Kaja Fj\u00f8rtoft","family":"Ystgaard","sequence":"first","affiliation":[]},{"given":"Luigi","family":"Atzori","sequence":"additional","affiliation":[]},{"given":"David","family":"Palma","sequence":"additional","affiliation":[]},{"given":"Poul Einar","family":"Heegaard","sequence":"additional","affiliation":[]},{"given":"Lene Elisabeth","family":"Bertheussen","sequence":"additional","affiliation":[]},{"given":"Magnus Rom","family":"Jensen","sequence":"additional","affiliation":[]},{"given":"Katrien","family":"De Moor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,4]]},"reference":[{"key":"4539_CR1","first-page":"119","volume-title":"AISEM annual conference on sensors and microsystems","author":"A Adamo","year":"2019","unstructured":"Adamo A (2019) Taming the techno leviathan: why we should adopt a society-in-the-loop model inside IoT utilities. AISEM annual conference on sensors and microsystems. Springer, Cham, pp 119\u2013129"},{"issue":"5","key":"4539_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3450965","volume":"54","author":"A Aljeraisy","year":"2021","unstructured":"Aljeraisy A, Barati M, Rana O, Perera C (2021) Privacy laws and privacy by design schemes for the Internet of Things: a developer\u2019s perspective. ACM Comput Surv (Csur) 54(5):1\u201338","journal-title":"ACM Comput Surv (Csur)"},{"issue":"15","key":"4539_CR3","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Comput Netw 54(15):2787\u20132805","journal-title":"Comput Netw"},{"issue":"16","key":"4539_CR4","doi-asserted-by":"crossref","first-page":"3594","DOI":"10.1016\/j.comnet.2012.07.010","volume":"56","author":"L Atzori","year":"2012","unstructured":"Atzori L, Iera A, Morabito G, Nitti M (2012) The social Internet of Things (siot)-when social networks meet the Internet of Things: concept, architecture and network characterization. Comput Netw 56(16):3594\u20133608","journal-title":"Comput Netw"},{"issue":"2","key":"4539_CR5","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/s12652-016-0387-y","volume":"8","author":"I Azimi","year":"2017","unstructured":"Azimi I, Rahmani AM, Liljeberg P, Tenhunen H (2017) Internet of Things for remote elderly monitoring: a study from user-centered perspective. J Ambient Intell Humaniz Comput 8(2):273\u2013289","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4539_CR6","doi-asserted-by":"crossref","unstructured":"Banerjee S, Hempel M, Ghasemzadeh P, Qian Y, Sharif H (2019) A novel approach to social-behavioral d2d trust associations using self-propelled voronoi. In: 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), IEEE, pp 1\u20135","DOI":"10.1109\/VTCFall.2019.8891357"},{"issue":"4","key":"4539_CR7","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1978822.1978833","volume":"18","author":"L Bannon","year":"2011","unstructured":"Bannon L (2011) Reimagining HCI: toward a more human-centered perspective. Interactions 18(4):50\u201357","journal-title":"Interactions"},{"issue":"5","key":"4539_CR8","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MCC.2018.053711666","volume":"5","author":"M Barhamgi","year":"2018","unstructured":"Barhamgi M, Perera C, Ghedira C, Benslimane D (2018) User-centric privacy engineering for the Internet of Things. IEEE Cloud Comput 5(5):47\u201357","journal-title":"IEEE Cloud Comput"},{"key":"4539_CR9","doi-asserted-by":"crossref","unstructured":"Bati GF, Singh VK (2018) \u201cTrust Us\u201d mobile phone use patterns can predict individual trust propensity. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp 1\u201314","DOI":"10.1145\/3173574.3173904"},{"key":"4539_CR10","unstructured":"Bego K, Brynskov M (2020) A vision for the future internet. Working Paper. https:\/\/www.ngi.eu\/wp-content\/uploads\/sites\/48\/2020\/10\/Vision-for-the-future-internet-long-version-final-1.pdf"},{"key":"4539_CR11","doi-asserted-by":"crossref","unstructured":"Beltran V, Martinez JA, Skarmeta AF (2017) User-centric access control for efficient security in smart cities. In: 2017 Global Internet of Things Summit (GIoTS), IEEE, pp 1\u20136","DOI":"10.1109\/GIOTS.2017.8016287"},{"issue":"11","key":"4539_CR12","doi-asserted-by":"crossref","first-page":"3640","DOI":"10.3390\/s21113640","volume":"21","author":"FZ Benhamida","year":"2021","unstructured":"Benhamida FZ, Navarro J, G\u00f3mez-Carmona O, Casado-Mansilla D, L\u00f3pez-de Ipi\u00f1a D, Zaballos A (2021) Pyff: a fog-based flexible architecture for enabling privacy-by-design IoT-based communal smart environments. Sensors 21(11):3640","journal-title":"Sensors"},{"key":"4539_CR13","doi-asserted-by":"crossref","unstructured":"Bermejo Fernandez C, Lee LH, Nurmi P, Hui P (2021) Para: privacy management and control in emerging iot ecosystems using augmented reality. In: Proceedings of the 2021 International Conference on Multimodal Interaction, pp 478\u2013486","DOI":"10.1145\/3462244.3479885"},{"key":"4539_CR14","doi-asserted-by":"crossref","unstructured":"Bernabe JB, Elicegui I, Gandrille E, Gligoric N, Gluhak A, Hennebert C, Hernandez-Ramos JL, L\u00f3pez C, Manchinu A, M\u00f6essner K, et al (2017) SocIoTal: the development and architecture of a social IoT framework. In: 2017 Global Internet of Things Summit (GIoTS), IEEE, pp 1\u20136","DOI":"10.1109\/GIOTS.2017.8016286"},{"issue":"1","key":"4539_CR15","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1177\/016224399301800107","volume":"18","author":"WE Bijker","year":"1993","unstructured":"Bijker WE (1993) Do not despair: there is life after constructivism. Sci Technol Hum Values 18(1):113\u2013138. https:\/\/doi.org\/10.1177\/016224399301800107","journal-title":"Sci Technol Hum Values"},{"key":"4539_CR16","doi-asserted-by":"crossref","unstructured":"Bornholdt H, Jost D, Kisters P, Rottleuthner M, Bade D, Lamersdorf W, Schmidt TC, Fischer M (2019) SANE: Smart networks for urban citizen participation. In: 2019 26th International Conference on Telecommunications (ICT), IEEE, pp 496\u2013500","DOI":"10.1109\/ICT.2019.8798771"},{"key":"4539_CR17","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/978-3-030-79840-6_3","volume-title":"International symposium on end user development","author":"B Breve","year":"2021","unstructured":"Breve B, Desolda G, Deufemia V, Greco F, Matera M (2021) An end-user development approach to secure smart environments. International symposium on end user development. Springer, Cham, pp 36\u201352"},{"key":"4539_CR18","unstructured":"Brynskov M, Michele Facca F, Hrasko G (2019) Building a roadmap for the Next Generation Internet of Things. Research, Innovation and Implementation 2021\u20132027. Scoping Paper. https:\/\/www.ngiot.eu\/wp-content\/uploads\/sites\/26\/2019\/09\/NGIoT_scoping-paper.pdf"},{"key":"4539_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-42500-5","volume-title":"Industrial IoT","author":"I Butun","year":"2020","unstructured":"Butun I, Almgren M, Gulisano V, Papatriantafilou M (2020) Industrial IoT. Springer, Cham"},{"key":"4539_CR20","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9764.001.0001","volume-title":"Positive computing: technology for wellbeing and human potential","author":"RA Calvo","year":"2014","unstructured":"Calvo RA, Peters D (2014) Positive computing: technology for wellbeing and human potential. MIT Press, London"},{"key":"4539_CR21","first-page":"20","volume":"14","author":"B Cammaerts","year":"2020","unstructured":"Cammaerts B, Mansell R (2020) Digital platform policy and regulation: toward a radical democratic turn. Int J Commun 14:20","journal-title":"Int J Commun"},{"key":"4539_CR22","doi-asserted-by":"crossref","unstructured":"Castells M (2009) The rise of the network society, volume 1, with a new preface.","DOI":"10.1002\/9781444319514"},{"issue":"1","key":"4539_CR23","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/JIOT.2021.3098028","volume":"9","author":"A Celik","year":"2021","unstructured":"Celik A, Salama KN, Eltawil AM (2021) The internet of bodies: a systematic survey on propagation characterization and channel modeling. IEEE Internet Things J 9(1):321\u2013345","journal-title":"IEEE Internet Things J"},{"key":"4539_CR24","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.erss.2016.10.011","volume":"23","author":"C Cherry","year":"2017","unstructured":"Cherry C, Hopfe C, MacGillivray B, Pidgeon N (2017) Homes as machines: exploring expert and public imaginaries of low carbon housing futures in the United Kingdom. Energy Res Soc Sci 23:36\u201345","journal-title":"Energy Res Soc Sci"},{"key":"4539_CR25","doi-asserted-by":"crossref","first-page":"101463","DOI":"10.1016\/j.techsoc.2020.101463","volume":"64","author":"BK Cheryl","year":"2021","unstructured":"Cheryl BK, Ng BK, Wong CY (2021) Governing the progress of internet-of-things: ambivalence in the quest of technology exploitation and user rights protection. Technol Soc 64:101463","journal-title":"Technol Soc"},{"key":"4539_CR26","volume-title":"Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), volume 10898 LNCS","author":"Q Chibaudel","year":"2018","unstructured":"Chibaudel Q, Joaquim B, V\u00e9ronique LN, Mounir M (2018) Human centered design conception applied to the Internet of Things: contribution and interest. Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), volume 10898 LNCS. Springer, Cham"},{"issue":"1","key":"4539_CR27","doi-asserted-by":"crossref","first-page":"45","DOI":"10.3233\/AIS-180506","volume":"11","author":"J Chin","year":"2019","unstructured":"Chin J, Callaghan V, Allouch SB (2019) The internet-of-things: reflections on the past, present and future from a user-centered and smart environment perspective. J Ambient Intell Smart Environ 11(1):45\u201369","journal-title":"J Ambient Intell Smart Environ"},{"issue":"3","key":"4539_CR28","first-page":"5","volume":"27","author":"I Chong","year":"2019","unstructured":"Chong I, Xiong A, Proctor RW (2019) Human factors in the privacy and security of the Internet of Things. Ergon Des 27(3):5\u201310","journal-title":"Ergon Des"},{"key":"4539_CR29","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7736.001.0001","volume-title":"Cyberpolitics in international relations","author":"N Choucri","year":"2012","unstructured":"Choucri N (2012) Cyberpolitics in international relations. MIT Press, London"},{"key":"4539_CR30","doi-asserted-by":"crossref","unstructured":"Cockton G (2004) Value-centred HCI. In: Proceedings of the Third Nordic Conference on Human-Computer Interaction, pp 149\u2013160","DOI":"10.1145\/1028014.1028038"},{"key":"4539_CR31","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.comcom.2018.07.034","volume":"131","author":"M Conti","year":"2018","unstructured":"Conti M, Passarella A (2018) The internet of people: a human and data-centric paradigm for the next generation internet. Comput Commun 131:51\u201365","journal-title":"Comput Commun"},{"key":"4539_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.pmcj.2017.07.009","volume":"41","author":"M Conti","year":"2017","unstructured":"Conti M, Passarella A, Das SK (2017) The Internet of People (IoP): a new wave in pervasive mobile computing. Pervasive Mob Comput 41:1\u201327","journal-title":"Pervasive Mob Comput"},{"issue":"5","key":"4539_CR33","first-page":"561","volume":"20","author":"L Cruickshank","year":"2017","unstructured":"Cruickshank L, Trivedi N (2017a) Beyond human-centred design: supporting a new materiality in the Internet of Things, or how to design when a toaster is one of your users. Des J 20(5):561\u2013576","journal-title":"Des J"},{"issue":"sup1","key":"4539_CR34","first-page":"S4158","volume":"20","author":"L Cruickshank","year":"2017","unstructured":"Cruickshank L, Trivedi N (2017b) When your toaster is a client, how do you design? Going beyond human centred design. Des J 20(sup1):S4158\u2013S4170","journal-title":"Des J"},{"key":"4539_CR35","doi-asserted-by":"crossref","unstructured":"Defiebre D, Germanakos P (2019) Towards a Human-Centered Model in SIoT-enhancing the interaction behaviour of things with personality traits. In: 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), IEEE, pp 1760\u20131767","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00313"},{"key":"4539_CR36","doi-asserted-by":"crossref","unstructured":"Dhelim S, Ning H, Bouras MA, Ma J (2018) Cyber-enabled human-centric smart home architecture. In: 2018 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), IEEE, pp 1880\u20131886","DOI":"10.1109\/SmartWorld.2018.00316"},{"key":"4539_CR37","doi-asserted-by":"crossref","unstructured":"Dustdar S, Scekic O (2018) On managing the social components in a smart city. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), IEEE, pp 1159\u20131163","DOI":"10.1109\/ICDCS.2018.00115"},{"key":"4539_CR38","unstructured":"European Commission (2022) Proposal for a regulation of the european parliament and of the council on harmonised rules on fair access to and use of data (data act). https:\/\/digital-strategy.ec.europa.eu\/en\/library\/data-act-proposal-regulation-harmonised-rules-fair-access-and-use-data. Accessed 25 Feb 2022"},{"key":"4539_CR39","doi-asserted-by":"crossref","unstructured":"Feng Y, Yao Y, Sadeh N (2021) A design space for privacy choices: Towards meaningful privacy control in the Internet of Things. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pp 1\u201316","DOI":"10.1145\/3411764.3445148"},{"key":"4539_CR40","first-page":"74","volume-title":"International conference on human aspects of information security, privacy, and trust","author":"D Feth","year":"2017","unstructured":"Feth D, Maier A, Polst S (2017) A user-centered model for usable security and privacy. International conference on human aspects of information security, privacy, and trust. Springer, Cham, pp 74\u201389"},{"key":"4539_CR41","doi-asserted-by":"crossref","unstructured":"Figueira A, Nunes D, Barbosa R, Reis A, Aguiar H, Sinche S, Rodrigues A, Pereira V, Dias H, Herrera C, et al (2016) WeDoCare: a humanitarian people-centric cyber-physical system for the benefit of refugees. In: 2016 IEEE Global Humanitarian Technology Conference (GHTC), IEEE, pp 213\u2013219","DOI":"10.1109\/GHTC.2016.7857283"},{"key":"4539_CR42","unstructured":"Fuller S (2009) The handbook of science and technology studies."},{"key":"4539_CR43","first-page":"59","volume-title":"European conference on service-oriented and cloud computing","author":"J Garcia-Alonso","year":"2016","unstructured":"Garcia-Alonso J, Berrocal J, Canal C, Murillo JM (2016) Towards distributed and context-aware human-centric cyber-physical systems. European conference on service-oriented and cloud computing. Springer, Cham, pp 59\u201373"},{"key":"4539_CR201","doi-asserted-by":"crossref","unstructured":"Garcia-Alonso J, Berrocal J, Canal C, Murillo JM (2018) Towards distributed and context-aware human-centric cyber-physical systems. In: Advances in Service-Oriented and Cloud Computing: Workshops of ESOCC 2016, Vienna, Austria, September 5--7, 2016, Revised Selected Papers 5, pp 59\u201373. Springer","DOI":"10.1007\/978-3-319-72125-5_5"},{"issue":"2","key":"4539_CR44","first-page":"5","volume":"5","author":"S Gasson","year":"2003","unstructured":"Gasson S (2003) Human-centered vs. user-centered approaches to information system design. J Inf Technol Theory Appl (JITTA) 5(2):5","journal-title":"J Inf Technol Theory Appl (JITTA)"},{"key":"4539_CR45","doi-asserted-by":"crossref","unstructured":"Geerts D, De Moor K, Ketyko I, Jacobs A, Van den Bergh J, Joseph W, Martens L, De Marez L (2010) Linking an integrated framework with appropriate methods for measuring GOE. In: 2010 Second international workshop on quality of multimedia experience (QoMEX), IEEE, pp 158\u2013163","DOI":"10.1109\/QOMEX.2010.5516292"},{"issue":"2","key":"4539_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3057861","volume":"24","author":"G Ghiani","year":"2017","unstructured":"Ghiani G, Manca M, Patern (2017) Personalization of context-dependent applications through trigger-action rules. ACM Trans Comput Hum Interact 24(2):1\u201333","journal-title":"ACM Trans Comput Hum Interact"},{"issue":"4","key":"4539_CR47","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1162\/desi_a_00612","volume":"36","author":"E Giaccardi","year":"2020","unstructured":"Giaccardi E, Redstr\u00f6m J (2020) Technology and more-than-human design. Des Issues 36(4):33\u201344","journal-title":"Des Issues"},{"issue":"11","key":"4539_CR48","doi-asserted-by":"crossref","first-page":"1295","DOI":"10.1002\/sec.313","volume":"4","author":"T Giannetsos","year":"2011","unstructured":"Giannetsos T, Dimitriou T, Prasad NR (2011) People-centric sensing in assistive healthcare: privacy challenges and directions. Secur Commun Netw 4(11):1295\u20131307","journal-title":"Secur Commun Netw"},{"key":"4539_CR50","doi-asserted-by":"crossref","unstructured":"Gracanin D, Lasisi RO, Azab M, Eltoweissy M (2019) Next generation smart built environments: the fusion of empathy, privacy and ethics. In: 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), IEEE, pp 260\u2013267","DOI":"10.1109\/TPS-ISA48467.2019.00041"},{"key":"4539_CR51","unstructured":"Graeff EEC (2018) Evaluating civic technology design for citizen empowerment. Ph. D. thesis, Massachusetts Institute of Technology"},{"key":"4539_CR52","doi-asserted-by":"crossref","unstructured":"Grundy J (2020) Human-centric Software Engineering for Next Generation Cloud-and Edge-based Smart Living Applications. In: Proceedings 20th IEEE\/ACM International Symposium on Cluster, Cloud and Internet Computing, CCGRID 2020, pp 1\u201310","DOI":"10.1109\/CCGrid49817.2020.00-93"},{"key":"4539_CR53","doi-asserted-by":"crossref","unstructured":"Hashemi SH, Faghri F, Rausch P, Campbell RH (2016) World of empowered IoT users. In: 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), IEEE, pp 13\u201324","DOI":"10.1109\/IoTDI.2015.39"},{"key":"4539_CR54","doi-asserted-by":"crossref","DOI":"10.4337\/9781802203110","volume-title":"Data ethics of power: a human approach in the big data and AI era","author":"G Hasselbalch","year":"2021","unstructured":"Hasselbalch G (2021) Data ethics of power: a human approach in the big data and AI era. Edward Elgar Publishing, Cheltenham"},{"issue":"4","key":"4539_CR55","doi-asserted-by":"crossref","first-page":"882","DOI":"10.1007\/s10922-020-09564-7","volume":"28","author":"C Hesselman","year":"2020","unstructured":"Hesselman C, Grosso P, Holz R, Kuipers F, Xue JH, Jonker M, de Ruiter J, Sperotto A, van Rijswijk-Deij R, Moura GC et al (2020) A responsible internet to increase trust in the digital world. J Netw Syst Manag 28(4):882\u2013922","journal-title":"J Netw Syst Manag"},{"issue":"3","key":"4539_CR56","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1080\/10447310701702717","volume":"23","author":"H Hochheiser","year":"2007","unstructured":"Hochheiser H, Lazar J (2007) Hci and societal issues: a framework for engagement. Int J Hum Comput Interact 23(3):339\u2013374","journal-title":"Int J Hum Comput Interact"},{"issue":"11","key":"4539_CR57","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1016\/j.telpol.2008.08.004","volume":"32","author":"J Huigen","year":"2008","unstructured":"Huigen J, Cave M (2008) Regulation and the promotion of investment in next generation networks: a European dilemma. Telecommun Policy 32(11):713\u2013721","journal-title":"Telecommun Policy"},{"issue":"4","key":"4539_CR58","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1007\/s11948-017-9976-1","volume":"24","author":"M Ienca","year":"2018","unstructured":"Ienca M, Wangmo T, Jotterand F, Kressig RW, Elger B (2018) Ethical design of intelligent assistive technologies for dementia: a descriptive review. Sci Eng Ethics 24(4):1035\u20131055","journal-title":"Sci Eng Ethics"},{"key":"4539_CR59","volume-title":"ISO9241-210: ergonomics of human-system interaction. Human-centred design for interactive systems","author":"International Standard","year":"2010","unstructured":"International Standard (2010) ISO9241-210: ergonomics of human-system interaction. Human-centred design for interactive systems. The International Organisation for Standardisation, Geneva"},{"key":"4539_CR60","doi-asserted-by":"crossref","unstructured":"Jia H, Wu M, Jung E, Shapiro A, Sundar SS (2012) Balancing human agency and object agency: an end-user interview study of the Internet of Things. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pp 1185\u20131188","DOI":"10.1145\/2370216.2370470"},{"issue":"2","key":"4539_CR61","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1080\/18918131.2017.1314110","volume":"35","author":"RF J\u00f8rgensen","year":"2017","unstructured":"J\u00f8rgensen RF, Desai T (2017) Right to privacy meets online platforms: Exploring privacy complaints against facebook and google. Nordic J Hum Rights 35(2):106\u2013126","journal-title":"Nordic J Hum Rights"},{"issue":"7","key":"4539_CR62","doi-asserted-by":"crossref","first-page":"2514","DOI":"10.3390\/s21072514","volume":"21","author":"T Kaluarachchi","year":"2021","unstructured":"Kaluarachchi T, Reis A, Nanayakkara S (2021) A review of recent deep learning approaches in human-centered machine learning. Sensors 21(7):2514","journal-title":"Sensors"},{"issue":"6","key":"4539_CR63","doi-asserted-by":"crossref","first-page":"e31485","DOI":"10.2196\/31485","volume":"6","author":"L Karni","year":"2022","unstructured":"Karni L, Jusufi I, Nyholm D, Klein GO, Memedi M et al (2022) Toward improved treatment and empowerment of individuals with Parkinson disease: design and evaluation of an Internet of Things system. JMIR Formative Res 6(6):e31485","journal-title":"JMIR Formative Res"},{"issue":"9","key":"4539_CR64","doi-asserted-by":"crossref","first-page":"100314","DOI":"10.1016\/j.patter.2021.100314","volume":"2","author":"E Kazim","year":"2021","unstructured":"Kazim E, Koshiyama AS (2021) A high-level overview of AI ethics. Patterns 2(9):100314","journal-title":"Patterns"},{"issue":"4","key":"4539_CR65","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1109\/TEM.2014.2354693","volume":"61","author":"HW Kim","year":"2014","unstructured":"Kim HW, Gupta S (2014) A user empowerment approach to information systems infusion. IEEE Trans Eng Manag 61(4):656\u2013668","journal-title":"IEEE Trans Eng Manag"},{"issue":"9\u201310","key":"4539_CR66","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1080\/14783363.2017.1310708","volume":"28","author":"Y Kim","year":"2017","unstructured":"Kim Y, Park Y, Choi J (2017) A study on the adoption of IoT smart home service: using value-based adoption model. Total Qual Manag Bus Excell 28(9\u201310):1149\u20131165","journal-title":"Total Qual Manag Bus Excell"},{"issue":"8","key":"4539_CR67","doi-asserted-by":"crossref","first-page":"2853","DOI":"10.1007\/s10845-018-1416-9","volume":"30","author":"XTR Kong","year":"2019","unstructured":"Kong XTR, Luo H, Huang GQ, Yang X (2019) Industrial wearable system: the human-centric empowering technology in Industry 4.0. J Intell Manuf 30(8):2853\u20132869","journal-title":"J Intell Manuf"},{"issue":"1","key":"4539_CR68","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s11257-011-9112-x","volume":"22","author":"JA Konstan","year":"2012","unstructured":"Konstan JA, Riedl J (2012) Recommender systems: from algorithms to user experience. User Model User-Adap Inter 22(1):101\u2013123","journal-title":"User Model User-Adap Inter"},{"key":"4539_CR69","doi-asserted-by":"crossref","unstructured":"Kor AL, Yanovsky M, Pattinson C, Kharchenko V (2016) SMART-ITEM: IoT-enabled smart living. In: 2016 Future Technologies Conference (FTC), IEEE, pp 739\u2013749","DOI":"10.1109\/FTC.2016.7821687"},{"key":"4539_CR70","doi-asserted-by":"crossref","unstructured":"Koreshoff TL, Leong TW, Robertson T (2013a) Approaching a human-centered Internet of Things. In: Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration, pp 363\u2013366","DOI":"10.1145\/2541016.2541093"},{"key":"4539_CR71","doi-asserted-by":"crossref","unstructured":"Koreshoff TL, Robertson T, Leong TW (2013b) Internet of Things: a review of literature and products. In: Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration, pp 335\u2013344","DOI":"10.1145\/2541016.2541048"},{"issue":"4","key":"4539_CR72","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MTS.2014.2364020","volume":"33","author":"I Kounelis","year":"2014","unstructured":"Kounelis I, Baldini G, Neisse R, Steri G, Tallacchini M, Pereira AG (2014) Building trust in the human? Internet of Things relationship. IEEE Technol Soc Mag 33(4):73\u201380","journal-title":"IEEE Technol Soc Mag"},{"key":"4539_CR74","doi-asserted-by":"publisher","first-page":"100179","DOI":"10.1016\/j.iot.2020.100179","volume":"11","author":"AD Kounoudes","year":"2020","unstructured":"Kounoudes AD, Kapitsaki GM (2020) 9. Mapping of IoT user-centric privacy preserving approaches to the GDPR. Internet of Things 11:100179. https:\/\/doi.org\/10.1016\/j.iot.2020.100179","journal-title":"Internet of Things"},{"key":"4539_CR73","doi-asserted-by":"crossref","unstructured":"Kounoudes AD, Kapitsaki GM, Katakis I, Milis M (2021) User-centred privacy inference detection for smart home devices. In: 2021 IEEE Smart World, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/IOP\/SCI), IEEE, pp 210\u2013218","DOI":"10.1109\/SWC50871.2021.00037"},{"key":"4539_CR75","doi-asserted-by":"crossref","unstructured":"Krontiris I, Freiling FC (2010) Integrating people-centric sensing with social networks: a privacy research agenda. In: 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), IEEE, pp 620\u2013623","DOI":"10.1109\/PERCOMW.2010.5470510"},{"issue":"4","key":"4539_CR76","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3287054","volume":"2","author":"H Kwon","year":"2018","unstructured":"Kwon H, Fischer JE, Flintham M, Colley J (2018) The connected shower: studying intimate data in everyday life. Proc ACM Interact Mobile Wearable Ubiquitous Technol 2(4):1\u201322","journal-title":"Proc ACM Interact Mobile Wearable Ubiquitous Technol"},{"issue":"5","key":"4539_CR77","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.intcom.2010.04.006","volume":"22","author":"ELC Law","year":"2010","unstructured":"Law ELC, Van Schaik P (2010) Modelling user experience-an agenda for research and practice. Interact Comput 22(5):313\u2013322","journal-title":"Interact Comput"},{"key":"4539_CR78","unstructured":"Lee J (2021) The connection of everything: China and the Internet of Things. MERICS, China Monitor. https:\/\/merics.org\/sites\/default\/files\/2021-06\/MericsChinaMonitor70InternetOfThings2.pdf"},{"issue":"3","key":"4539_CR79","doi-asserted-by":"crossref","first-page":"102249","DOI":"10.1016\/j.isci.2021.102249","volume":"24","author":"B Lepri","year":"2021","unstructured":"Lepri B, Oliver N, Pentland A (2021) Ethical machines: the human-centric use of artificial intelligence. IScience 24(3):102249","journal-title":"IScience"},{"key":"4539_CR80","first-page":"181","volume":"9","author":"Y Levy","year":"2006","unstructured":"Levy Y, Ellis TJ (2006) A systems approach to conduct an effective literature review in support of information systems research. Inf Sci 9:181\u2013212","journal-title":"Inf Sci"},{"key":"4539_CR81","first-page":"134","volume-title":"Proceedings of the future technologies conference","author":"J Lindley","year":"2018","unstructured":"Lindley J, Coulton P, Cooper R (2018) The IoT and unpacking the Heffalump\u2019s Trunk. Proceedings of the future technologies conference. Springer, Cham, pp 134\u2013151"},{"key":"4539_CR82","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/978-3-319-29003-4_8","volume-title":"International conference on mobile computing, applications, and services","author":"C Liu","year":"2015","unstructured":"Liu C, Julien C (2015) Pervasive context sharing in magpie: adaptive trust-based privacy protection. International conference on mobile computing, applications, and services. Springer, Cham, pp 122\u2013139"},{"issue":"4","key":"4539_CR83","doi-asserted-by":"publisher","first-page":"4072","DOI":"10.1109\/JSYST.2019.2901595","volume":"13","author":"C Lu","year":"2019","unstructured":"Lu C, Tsai C (2019) IoT-enabled cross-field and reconfigurable service provisioning with user-centered design. IEEE Syst J 13(4):4072\u20134080. https:\/\/doi.org\/10.1109\/JSYST.2019.2901595","journal-title":"IEEE Syst J"},{"key":"4539_CR84","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/978-981-15-1304-6_21","volume-title":"International conference on dependability in sensor, cloud, and big data systems and applications","author":"Y Lu","year":"2019","unstructured":"Lu Y, Li S, Ioannou A, Tussyadiah I (2019) From data disclosure to privacy nudges: a privacy-aware and user-centric personal data management framework. International conference on dependability in sensor, cloud, and big data systems and applications. Springer, Cham, pp 262\u2013276"},{"key":"4539_CR85","doi-asserted-by":"crossref","unstructured":"Lundberg J, Gustavsson R (2011) Challenges and opportunities of sensor based user empowerment. In: 2011 International Conference on Networking, Sensing and Control. IEEE, pp 463\u2013468","DOI":"10.1109\/ICNSC.2011.5874879"},{"key":"4539_CR86","first-page":"235","volume-title":"IFIP international Internet of Things conference","author":"V M\u00e4hler","year":"2019","unstructured":"M\u00e4hler V (2019) The thing about the Internet of Things: scoping the social science discourse in IoT research. IFIP international Internet of Things conference. Springer, Cham, pp 235\u2013251"},{"key":"4539_CR87","doi-asserted-by":"crossref","unstructured":"Marky K, Prange S, Krell F, M\u00fchlh\u00e4user M, Alt F (2020a) \u201cYou just can\u2019t know about everything\u201d: privacy Perceptions of Smart Home Visitors. In: 19th International Conference on Mobile and Ubiquitous Multimedia, pp 83\u201395","DOI":"10.1145\/3428361.3428464"},{"key":"4539_CR88","doi-asserted-by":"crossref","unstructured":"Marky K, Voit A, St\u00f6ver A, Kunze K, Schr\u00f6der S, M\u00fchlh\u00e4user M (2020b) \u201cI don\u2019t know how to protect myself\u201d: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments. In: Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, pp 1\u201311","DOI":"10.1145\/3419249.3420164"},{"key":"4539_CR89","doi-asserted-by":"crossref","unstructured":"Marky K, Zimmermann V, St\u00f6ver A, Hoffmann P, Kunze K, M\u00fchlh\u00e4user M (2020c) All in one! user perceptions on centralized iot privacy settings. In: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, pp 1\u20138","DOI":"10.1145\/3334480.3383016"},{"issue":"8","key":"4539_CR90","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1177\/1550147717727974","volume":"13","author":"JA Martinez","year":"2017","unstructured":"Martinez JA, Hernez Ramos JL, Beltran V, Skarmeta A, Ruiz PM (2017) A user-centric Internet of Things platform to empower users for managing security and privacy concerns in the Internet of Energy. Int J Distrib Sens Netw 13(8):16","journal-title":"Int J Distrib Sens Netw"},{"issue":"1","key":"4539_CR91","doi-asserted-by":"crossref","first-page":"14","DOI":"10.3390\/jsan7010014","volume":"7","author":"M Memedi","year":"2018","unstructured":"Memedi M, Tshering G, Fogelberg M, Jusufi I, Kolkowska E, Klein G (2018) An interface for IoT: feeding back health-related data to Parkinson\u2019s disease patients. J Sens Actuator Netw 7(1):14","journal-title":"J Sens Actuator Netw"},{"key":"4539_CR92","first-page":"194","volume-title":"International conference on advanced information systems engineering","author":"J Michael","year":"2019","unstructured":"Michael J, Koschmider A, Mannhardt F, Baracaldo N, Rumpe B, Cappiello C, Ruiz M (2019) User-centered and privacy-driven process mining system design for IoT. International conference on advanced information systems engineering, vol 350. Springer, Berlin, pp 194\u2013206"},{"issue":"1","key":"4539_CR93","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1177\/0162243919900965","volume":"46","author":"B Miller","year":"2021","unstructured":"Miller B (2021) Is technology value-neutral? Sci Technol Hum Values 46(1):53\u201380","journal-title":"Sci Technol Hum Values"},{"key":"4539_CR94","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.procs.2021.12.005","volume":"196","author":"S Mohanty","year":"2022","unstructured":"Mohanty S, Cormican K, Dhanapathi C (2022) Analysis of critical success factors to mitigate privacy risks in IoT devices. Proced Comput Sci 196:191\u2013198","journal-title":"Proced Comput Sci"},{"issue":"3","key":"4539_CR95","first-page":"1","volume":"14","author":"M Mordacchini","year":"2020","unstructured":"Mordacchini M, Conti M, Passarella A, Bruno R (2020) Human-centric data dissemination in the IoP: large-scale modeling and evaluation. ACM Trans Auton Adapt Syst (TAAS) 14(3):1\u201325","journal-title":"ACM Trans Auton Adapt Syst (TAAS)"},{"key":"4539_CR96","doi-asserted-by":"crossref","unstructured":"Moreno MV, Hern\u00e1ndez JL, Skarmeta AF, Nati M, Palaghias N, Gluhak A, Van Kranenburg R (2014) A framework for citizen participation in the Internet of Things. In: 2014 28th International Conference on Advanced Information Networking and Applications Workshops, IEEE, pp 815\u2013820","DOI":"10.1109\/WAINA.2014.161"},{"key":"4539_CR97","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/978-3-319-09177-8_14","volume-title":"Future human-centric smart environments, modeling and processing for next-generation big-data technologies","author":"MV Moreno-Cano","year":"2015","unstructured":"Moreno-Cano MV, Santa J, Zamora-Izquierdo MA, Skarmeta AF (2015) Future human-centric smart environments, modeling and processing for next-generation big-data technologies. Springer, Berlin, pp 341\u2013365"},{"key":"4539_CR98","volume-title":"Computer systems in work design-the ETHICS method: effective technical and human implementation of computer systems: a work design exercise book for individuals and groups","author":"E Mumford","year":"1979","unstructured":"Mumford E, Weir M (1979) Computer systems in work design-the ETHICS method: effective technical and human implementation of computer systems: a work design exercise book for individuals and groups. Wiley, New York"},{"key":"4539_CR99","doi-asserted-by":"crossref","unstructured":"Nasir A, Lim HB, Soong BH (2012) An integrated vehicular and urban sensing system: Framework and modeling. In: The International Conference on Information Network 2012, IEEE, pp 159\u2013164","DOI":"10.1109\/ICOIN.2012.6164369"},{"key":"4539_CR100","doi-asserted-by":"crossref","unstructured":"Nawaz T, Rinner B, Ferryman J (2016) User-centric, embedded vision-based human monitoring: a concept and a healthcare use case. In: Proceedings of the 10th International Conference on Distributed Smart Camera, pp 25\u201330","DOI":"10.1145\/2967413.2967422"},{"issue":"2","key":"4539_CR101","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/COMST.2015.2398816","volume":"17","author":"DS Nunes","year":"2015","unstructured":"Nunes DS, Zhang P, Silva JS (2015) A survey on human-in-the-loop applications towards an internet of all. IEEE Commun Surv Tutor 17(2):944\u2013965. https:\/\/doi.org\/10.1109\/COMST.2015.2398816","journal-title":"IEEE Commun Surv Tutor"},{"key":"4539_CR102","doi-asserted-by":"crossref","unstructured":"Nurse JRC, Atamli A, Martin A (2016) Towards a usable framework for modelling security and privacy risks in the smart home. In: Human aspects of information security, privacy, and trust: 4th International Conference, HAS 2016, held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings 4, pp 255\u2013267. Springer","DOI":"10.1007\/978-3-319-39381-0_23"},{"issue":"2","key":"4539_CR103","doi-asserted-by":"crossref","first-page":"900","DOI":"10.3390\/su14020900","volume":"14","author":"S Oppl","year":"2022","unstructured":"Oppl S, Stary C (2022) Motivating users to manage privacy concerns in cyber-physical settings\u2013a design science approach considering self-determination theory. Sustainability 14(2):900","journal-title":"Sustainability"},{"key":"4539_CR104","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3592.001.0001","volume-title":"How users matter: the co-construction of users and technology (inside technology)","author":"N Oudshoorn","year":"2003","unstructured":"Oudshoorn N, Pinch T (2003) How users matter: the co-construction of users and technology (inside technology). The MIT Press, London"},{"issue":"4","key":"4539_CR105","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1080\/19460171.2021.1927776","volume":"15","author":"M Padden","year":"2021","unstructured":"Padden M, Ajehag Pettersson A (2021) Protected how? Problem representations of risk in the general data protection regulation (GDPR). Crit Policy Stud 15(4):486\u2013503. https:\/\/doi.org\/10.1080\/19460171.2021.1927776","journal-title":"Crit Policy Stud"},{"key":"4539_CR106","unstructured":"Pereira \u00c2G, Benessia A, Curvelo P (2013) Agency in the Internet of Things. Publications Office of the European Union. https:\/\/publications.jrc.ec.europa.eu\/repository\/handle\/JRC87270"},{"issue":"1","key":"4539_CR107","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","volume":"16","author":"C Perera","year":"2013","unstructured":"Perera C, Zaslavsky A, Christen P, Georgakopoulos D (2013) Context aware computing for the Internet of Things: a survey. IEEE Commun Surv Tutor 16(1):414\u2013454","journal-title":"IEEE Commun Surv Tutor"},{"key":"4539_CR108","doi-asserted-by":"crossref","unstructured":"Qin P (2021) Based on the full-scene smart community model: analysis on the development and challenges of the home-use of Internet of Things in china. In: 2021 International Conference on Computer, Internet of Things and Control Engineering (CITCE), IEEE, pp 92\u201395","DOI":"10.1109\/CITCE54390.2021.00025"},{"key":"4539_CR109","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-319-02681-7_2","volume-title":"Quality and quality of experience","author":"A Raake","year":"2014","unstructured":"Raake A, Egger S (2014) Quality and quality of experience. Springer International Publishing, Cham, pp 11\u201333"},{"key":"4539_CR110","doi-asserted-by":"crossref","unstructured":"Ramos G, Suh J, Ghorashi S, Meek C, Banks R, Amershi S, Fiebrink R, Smith-Renner A, Bansal G (2019) Emerging perspectives in human-centered machine learning. In: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, pp 1\u20138","DOI":"10.1145\/3290607.3299014"},{"key":"4539_CR111","first-page":"300","volume-title":"International conference on security for information technology and communications","author":"K Rantos","year":"2018","unstructured":"Rantos K, Drosatos G, Demertzis K, Ilioudis C, Papanikolaou A, Kritsas A (2018) ADvoCATE: a consent management platform for personal data processing in the IoT using blockchain technology. International conference on security for information technology and communications. Springer, Cham, pp 300\u2013313"},{"key":"4539_CR112","doi-asserted-by":"crossref","unstructured":"Rao PM, Deebak B (2022) Security and privacy issues in smart cities\/industries: technologies, applications, and challenges. J Ambient Intell Humaniz Comput 13:1\u201337","DOI":"10.1007\/s12652-022-03707-1"},{"key":"4539_CR113","doi-asserted-by":"crossref","unstructured":"Rivadeneira JE, Silva JS, Colomo-Palacios R, Rodrigues A, Fernandes JM, Boavida F (2021) A privacy-aware framework integration into a human-in-the-loop IoT system. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE, pp 1\u20136","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484634"},{"key":"4539_CR114","doi-asserted-by":"crossref","first-page":"100465","DOI":"10.1016\/j.iot.2021.100465","volume":"17","author":"S Rizvi","year":"2022","unstructured":"Rizvi S, Williams I, Campbell S (2022) Tui model for data privacy assessment in IoT networks. Internet of Things 17:100465","journal-title":"Internet of Things"},{"issue":"4","key":"4539_CR115","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MCE.2021.3095385","volume":"11","author":"R Rohan","year":"2021","unstructured":"Rohan R, Funilkul S, Pal D, Thapliyal H (2021) Humans in the loop: cybersecurity aspects in the consumer IoT context. IEEE Consum Electr Mag 11(4):78\u201384","journal-title":"IEEE Consum Electr Mag"},{"issue":"2","key":"4539_CR116","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s10676-018-9452-x","volume":"20","author":"L Royakkers","year":"2018","unstructured":"Royakkers L, Timmer J, Kool L, van Est R (2018) Societal and ethical issues of digitization. Ethics Inf Technol 20(2):127\u2013142","journal-title":"Ethics Inf Technol"},{"key":"4539_CR117","volume-title":"Human compatible: artificial intelligence and the problem of control","author":"S Russell","year":"2019","unstructured":"Russell S (2019) Human compatible: artificial intelligence and the problem of control. Penguin, London"},{"issue":"2","key":"4539_CR118","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1109\/JSYST.2016.2555292","volume":"12","author":"J Santos","year":"2018","unstructured":"Santos J, Rodrigues JJPC, Casal J, Saleem K, Denisov V (2018) Intelligent personal assistants based on Internet of Things approaches. IEEE Syst J 12(2):1793\u20131802. https:\/\/doi.org\/10.1109\/JSYST.2016.2555292","journal-title":"IEEE Syst J"},{"key":"4539_CR119","first-page":"1","volume-title":"Sociotechnical approaches to the study of information systems, computing handbook, third edition: information systems and information technology","author":"S Sawyer","year":"2014","unstructured":"Sawyer S, Jarrahi MH (2014) Sociotechnical approaches to the study of information systems, computing handbook, third edition: information systems and information technology. CRC Press, London, pp 1\u20135"},{"key":"4539_CR120","doi-asserted-by":"crossref","unstructured":"Scargill T, Chen Y, Eom S, Dunn J, Gorlatova M (2022) Environmental, user, and social context-aware augmented reality for supporting personal development and change. In: 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), IEEE, pp 155\u2013162","DOI":"10.1109\/VRW55335.2022.00042"},{"key":"4539_CR121","first-page":"111","volume-title":"International conference on human-computer interaction","author":"T Schemmer","year":"2020","unstructured":"Schemmer T, Brauner P, Schaar AK, Ziefle M, Brillowski F (2020) User-centred design of a process-recommender system for fibre-reinforced polymer production. International conference on human-computer interaction. Springer, Cham, pp 111\u2013127"},{"key":"4539_CR122","doi-asserted-by":"crossref","unstructured":"Schneider H, Eiband M, Ullrich D, Butz A, (2018) Empowerment in HCI-A survey and framework. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp 1\u201314","DOI":"10.1145\/3173574.3173818"},{"key":"4539_CR123","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-319-07485-6_21","volume-title":"Learning and collaboration technologies. Technology-rich environments for learning and collaboration","author":"T Schulz","year":"2014","unstructured":"Schulz T (2014) Creating universal designed and trustworthy objects for the Internet of Things. In: Zaphiris P, Ioannou A (eds) Learning and collaboration technologies. Technology-rich environments for learning and collaboration. Springer International Publishing, Cham, pp 206\u2013214"},{"key":"4539_CR124","doi-asserted-by":"crossref","unstructured":"Semeria MN (2016) Symbiotic low-power, smart and secure technologies in the age of hyper connectivity. In: 2016 IEEE International Electron Devices Meeting (IEDM), IEEE, pp 1\u20133","DOI":"10.1109\/IEDM.2016.7838027"},{"key":"4539_CR125","doi-asserted-by":"crossref","unstructured":"Sen A, Fletcher K, Madria S (2019) A Secure User-Centric Framework for Dynamic Service Provisioning in IoT Environments. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science And Engineering (TrustCom\/BigDataSE), pp 334\u2013341","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00052"},{"key":"4539_CR126","doi-asserted-by":"crossref","unstructured":"Shaikh T, Ismail S, Stevens JD (2016) Aura Minora: a user centric IOT architecture for Smart City. In: Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, pp 1\u20135","DOI":"10.1145\/3010089.3016028"},{"issue":"1","key":"4539_CR127","first-page":"77","volume":"19","author":"DH Shin","year":"2017","unstructured":"Shin DH, Park YJ (2017) Understanding the Internet of Things ecosystem: multi-level analysis of users, society, and ecology. Digit Policy Regul Gov 19(1):77\u2013100","journal-title":"Digit Policy Regul Gov"},{"issue":"6","key":"4539_CR128","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1080\/10447318.2020.1741118","volume":"36","author":"B Shneiderman","year":"2020","unstructured":"Shneiderman B (2020) Human-centered artificial intelligence: reliable, safe and trustworthy. Int J Hum-Comput Interact 36(6):495\u2013504","journal-title":"Int J Hum-Comput Interact"},{"key":"4539_CR129","doi-asserted-by":"crossref","first-page":"102776","DOI":"10.1016\/j.cose.2022.102776","volume":"120","author":"A Showail","year":"2022","unstructured":"Showail A, Tahir R, Zaffar MF, Noor MH, Al-Khatib M (2022) An internet of secure and private things: a service-oriented architecture. Comput Secur 120:102776","journal-title":"Comput Secur"},{"key":"4539_CR130","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of Things: the road ahead. Comput Netw 76:146\u2013164","journal-title":"Comput Netw"},{"key":"4539_CR131","unstructured":"Sloane M (2019) Inequality is the name of the game: thoughts on the emerging field of technology, ethics and social justice. In: Weizenbaum Conference, DEU, p 9"},{"key":"4539_CR132","volume-title":"The encyclopedia of human-computer interaction","author":"M Soegaard","year":"2012","unstructured":"Soegaard M, Dam RF (2012) The encyclopedia of human-computer interaction. The Interaction Design Foundation, Aalborg, Denmark"},{"key":"4539_CR133","doi-asserted-by":"crossref","first-page":"109663","DOI":"10.1016\/j.rser.2019.109663","volume":"120","author":"BK Sovacool","year":"2020","unstructured":"Sovacool BK, Del Rio DDF (2020) Smart home technologies in Europe: a critical review of concepts, benefits, risks and policies. Renew Sustain Energy Rev 120:109663","journal-title":"Renew Sustain Energy Rev"},{"key":"4539_CR134","volume-title":"The little book of sustainability for the Internet of Things","author":"MR Stead","year":"2019","unstructured":"Stead MR, Coulton P, Lindley JG, Coulton C (2019) The little book of sustainability for the Internet of Things. Imagination Lancaster, Lancaster, UK"},{"issue":"14","key":"4539_CR135","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1080\/10447318.2019.1619259","volume":"35","author":"C Stephanidis","year":"2019","unstructured":"Stephanidis C, Salvendy G, Antona M, Chen JY, Dong J, Duffy VG, Fang X, Fidopiastis C, Fragomeni G, Fu LP et al (2019) Seven HCI grand challenges. Int J Hum-Comput Interact 35(14):1229\u20131269","journal-title":"Int J Hum-Comput Interact"},{"key":"4539_CR136","first-page":"1","volume-title":"European conference on ambient intelligence","author":"N Streitz","year":"2017","unstructured":"Streitz N (2017) Reconciling humans and technology: the role of ambient intelligence. European conference on ambient intelligence. Springer, Cham, pp 1\u201316"},{"issue":"2","key":"4539_CR137","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1007\/s12652-018-0824-1","volume":"10","author":"N Streitz","year":"2019","unstructured":"Streitz N (2019) 2. Beyond smart-only cities: redefining the smart-everything paradigm. J Ambient Intell Humaniz Comput 10(2):791\u2013812. https:\/\/doi.org\/10.1007\/s12652-018-0824-1","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"4539_CR200","first-page":"127","volume":"5","author":"NA Streitz","year":"2021","unstructured":"Streitz NA (2021) From smart-only cities towards humane and cooperative hybrid cities. Technol| Architect+ Des 5(2):127\u2013133","journal-title":"Technol| Architect+ Des"},{"issue":"1","key":"4539_CR138","doi-asserted-by":"crossref","first-page":"87","DOI":"10.3233\/AIS-180507","volume":"11","author":"N Streitz","year":"2019","unstructured":"Streitz N, Charitos D, Kaptein M, B\u00f6hlen M (2019) Grand challenges for ambient intelligence and implications for design contexts and smart societies. J Ambient Intell Smart Environ 11(1):87\u2013107","journal-title":"J Ambient Intell Smart Environ"},{"key":"4539_CR139","doi-asserted-by":"crossref","first-page":"175779","DOI":"10.1109\/ACCESS.2019.2957341","volume":"7","author":"M Suryanegara","year":"2019","unstructured":"Suryanegara M, Prasetyo DA, Andriyanto F, Hayati N (2019) A 5-step framework for measuring the quality of experience (GOE) of Internet of Things (IoT) services. IEEE Access 7:175779\u2013175792","journal-title":"IEEE Access"},{"key":"4539_CR140","first-page":"240","volume-title":"IFIP international conference on information security theory and practice","author":"T Sylla","year":"2019","unstructured":"Sylla T, Chalouf MA, Krief F, Samak\u00e9 K (2019) Towards a context-aware security and privacy as a service in the Internet of Things. IFIP international conference on information security theory and practice. Springer, Cham, pp 240\u2013252"},{"key":"#cr-split#-4539_CR141.1","unstructured":"The European Parliament and the Council of the European Union (2016) Regulation"},{"key":"#cr-split#-4539_CR141.2","unstructured":"(eu) 2016\/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (general data protection regulation). Official Journal of the European Union L 119\/1"},{"key":"4539_CR142","volume-title":"European declaration on digital rights and principles for the next decade","author":"The European Parliament","year":"2022","unstructured":"The European Parliament (2022) European declaration on digital rights and principles for the next decade. The European Parliament, Brussels"},{"issue":"3","key":"4539_CR143","doi-asserted-by":"crossref","first-page":"e27047","DOI":"10.2196\/27047","volume":"4","author":"F Tiersen","year":"2021","unstructured":"Tiersen F, Batey P, Harrison MJ, Naar L, Serban AI, Daniels SJ, Calvo RA et al (2021) Smart home sensing and monitoring in households with dementia: user-centered design approach. JMIR Aging 4(3):e27047","journal-title":"JMIR Aging"},{"key":"4539_CR144","doi-asserted-by":"crossref","unstructured":"Toumia A, Szoniecky S, Saleh I (2020) ColPri: towards a collaborative privacy knowledge management ontology for the Internet of Things. In: 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), pp 150\u2013157","DOI":"10.1109\/FMEC49853.2020.9144927"},{"key":"4539_CR145","first-page":"633","volume-title":"IFIP conference on human-computer interaction","author":"M Turunen","year":"2015","unstructured":"Turunen M, Sonntag D, Engelbrecht KP, Olsson T, Schnelle-Walka D, Lucero A (2015) Interaction and humans in Internet of Things. IFIP conference on human-computer interaction. Springer, Cham, pp 633\u2013636"},{"issue":"2","key":"4539_CR146","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCOM.2017.1600633CM","volume":"55","author":"JF Valenzuela-Valdes","year":"2017","unstructured":"Valenzuela-Valdes JF, Lopez MA, Padilla P, Padilla JL, Minguillon J (2017) Human neuro-activity for securing body area networks: application of brain-computer interfaces to people-centric Internet of Things. IEEE Commun Mag 55(2):62\u201367. https:\/\/doi.org\/10.1109\/MCOM.2017.1600633CM","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"4539_CR147","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5923\/j.computer.20110101.01","volume":"1","author":"R Van Kranenburg","year":"2012","unstructured":"Van Kranenburg R, Bassi A (2012) Iot challenges. Communications in mobile. Computing 1(1):1\u20135","journal-title":"Computing"},{"key":"4539_CR148","first-page":"1","volume":"1","author":"J Voas","year":"2018","unstructured":"Voas J, Kuhn R, Laplante P, Applebaum S (2018) Internet of Things (IoT) trust concerns. NIST Tech Rep 1:1\u201350","journal-title":"NIST Tech Rep"},{"issue":"1","key":"4539_CR149","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1002\/poi3.198","volume":"11","author":"B Wagner","year":"2019","unstructured":"Wagner B (2019) Liable, but not in control? Ensuring meaningful human agency in automated decision-making systems. Policy Internet 11(1):104\u2013122. https:\/\/doi.org\/10.1002\/poi3.198","journal-title":"Policy Internet"},{"key":"4539_CR150","first-page":"60","volume-title":"Healthcare","author":"S Wang","year":"2019","unstructured":"Wang S, Bolling K, Mao W, Reichstadt J, Jeste D, Kim HC, Nebeker C (2019) Technology to support aging in place: older adults perspectives. Healthcare, vol 7. Multidisciplinary Digital Publishing Institute, London, p 60"},{"issue":"21","key":"4539_CR151","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1016\/j.ifacol.2016.10.641","volume":"49","author":"S Watt","year":"2016","unstructured":"Watt S, Milne C, Bradley D, Russell D, Hehenberger P, Azorin-Lopez J (2016) Privacy matters-issues within mechatronics. IFAC-Papers OnLine 49(21):423\u2013430","journal-title":"IFAC-Papers OnLine"},{"key":"4539_CR152","first-page":"35","volume-title":"Quality of experience versus user experience","author":"I Wechsung","year":"2014","unstructured":"Wechsung I, De Moor K (2014) Quality of experience versus user experience. Springer International Publishing, Cham, pp 35\u201354"},{"key":"4539_CR153","doi-asserted-by":"crossref","unstructured":"Wickramasinghe CI, Reinhardt D (2019) A survey-based exploration of users\u2019 awareness and their willingness to protect their data with smart objects. In: Privacy and Identity Management, pp 427\u2013446","DOI":"10.1007\/978-3-030-42504-3_27"},{"key":"4539_CR154","first-page":"190","volume-title":"International conference on mobile and ubiquitous systems: computing, networking, and services","author":"CI Wickramasinghe","year":"2021","unstructured":"Wickramasinghe CI, Reinhardt D (2021) A user-centric privacy-preserving approach to control data collection, storage, and disclosure in own smart home environments. International conference on mobile and ubiquitous systems: computing, networking, and services. Springer, Cham, pp 190\u2013206"},{"key":"4539_CR155","first-page":"125","volume-title":"Algorithmic discrimination: Big data analytics and the future of the Internet, The future internet","author":"J Winter","year":"2015","unstructured":"Winter J (2015) Algorithmic discrimination: Big data analytics and the future of the Internet, The future internet. Springer, Cham, pp 125\u2013140"},{"issue":"4","key":"4539_CR156","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1093\/idpl\/ipab014","volume":"11","author":"B Wong","year":"2021","unstructured":"Wong B (2021) Problems with controller-based responsibility in EU data protection law. Int Data Privacy Law 11(4):375\u2013387","journal-title":"Int Data Privacy Law"},{"key":"4539_CR157","doi-asserted-by":"crossref","unstructured":"Worthy P, Matthews B, Viller S (2016) Trust me: doubts and concerns living with the Internet of Things. In: Proceedings of the 2016 ACM Conference on Designing Interactive Systems, pp 427\u2013434","DOI":"10.1145\/2901790.2901890"},{"issue":"1","key":"4539_CR158","first-page":"1","volume":"3","author":"P Wright","year":"2010","unstructured":"Wright P, McCarthy J (2010) Experience-centered design: designers, users, and communities in dialogue. Synth Lect Hum Cent Inf 3(1):1\u2013123","journal-title":"Synth Lect Hum Cent Inf"},{"issue":"CSCW","key":"4539_CR159","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3359161","volume":"3","author":"Y Yao","year":"2019","unstructured":"Yao Y, Basdeo JR, Mcdonough OR, Wang Y (2019a) Privacy perceptions and designs of bystanders in smart homes. Proc ACM Hum-Comput Interact 3(CSCW):1\u201324","journal-title":"Proc ACM Hum-Comput Interact"},{"key":"4539_CR160","doi-asserted-by":"crossref","unstructured":"Yao Y, Basdeo JR, Kaushik S, Wang Y (2019b) Defending my castle: A co-design study of privacy mechanisms for smart homes. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp 1\u201312","DOI":"10.1145\/3290605.3300428"},{"key":"4539_CR161","doi-asserted-by":"crossref","unstructured":"Ystgaard KF, De Moor K (2021) Bring the human to the network: 5G and beyond. In: 2021 28th International Conference on Telecommunications (ICT), IEEE, pp 1\u20137","DOI":"10.1109\/ICT52184.2021.9511537"},{"key":"4539_CR162","doi-asserted-by":"crossref","unstructured":"Zaric N, Djurisic MP, Mihovska A (2016) Ambient assisted living systems in the context of human-centric sensing and IoT concept: eWall case study. 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications Workshop, pp 1\u20137","DOI":"10.1109\/PIMRC.2016.7794582"},{"issue":"3","key":"4539_CR163","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1515\/icom-2019-0015","volume":"18","author":"V Zimmermann","year":"2019","unstructured":"Zimmermann V, Gerber P, Marky K, B\u00f6ck L, Kirchbuchner F (2019) Assessing users privacy and security concerns of smart home technologies. i-com 18(3):197\u2013216","journal-title":"i-com"},{"key":"4539_CR164","unstructured":"Zuboff S (2019) The age of surveillance capitalism: the fight for a human future at the new frontier of power: Barack Obama\u2019s books of 2019. Profile Books Ltd"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-023-04539-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-023-04539-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-023-04539-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T16:24:27Z","timestamp":1677774267000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-023-04539-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,4]]},"references-count":166,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["4539"],"URL":"https:\/\/doi.org\/10.1007\/s12652-023-04539-3","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,4]]},"assertion":[{"value":"25 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}