{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:28:38Z","timestamp":1752550118924,"version":"3.28.0"},"reference-count":92,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9006341","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T01:05:34Z","timestamp":1582592734000},"page":"5282-5291","source":"Crossref","is-referenced-by-count":15,"title":["Privacy in IoT Blockchains: with Big Data comes Big Responsibility"],"prefix":"10.1109","author":[{"given":"Steven A.","family":"Wright","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"An Evaluation Framework for Privacy Impact Assessment Methods","year":"2018","author":"vemou","key":"ref73"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.06.007"},{"key":"ref71","first-page":"601","article-title":"Securing fog computing for internet of things applications: Challenges and solutions","volume":"20 1","author":"ni","year":"2017","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-019-00718-z"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/QIR.2017.8168535"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9517-1"},{"key":"ref74","doi-asserted-by":"crossref","DOI":"10.1108\/ICS-04-2019-0047","article-title":"Evaluating privacy impact assessment methods: guidelines and best practice","author":"vemou","year":"2019","journal-title":"Information and Computer Security"},{"journal-title":"Vermont S 269 (Act 205)","first-page":"4171\ufffd","year":"2018","key":"ref39"},{"journal-title":"Privacy and Data Protection Impact Assessment Framework for RFID Applications","year":"2011","key":"ref75"},{"key":"ref38","first-page":"257","article-title":"Of bitcoins, Independently wealth software and the zero member LLC","volume":"108","author":"bayern","year":"2014","journal-title":"Northwestern Univ Law Rev"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0115-7"},{"journal-title":"Model-driven Evidence-based Privacy Risk Control in Trustworthy Smart IoT Systems","year":"2019","author":"munt\u00e9s-mulero","key":"ref79"},{"journal-title":"International Covenant on Civil and Political Rights","year":"1976","key":"ref33"},{"journal-title":"Universal Declaration of Human Rights","year":"1948","key":"ref32"},{"journal-title":"Forecast IoT Security Worldwide 2018","year":"2018","author":"contu","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-016-9754-5"},{"journal-title":"Global Data Privacy Laws 2019 New Eras for International Standards","year":"2019","key":"ref37"},{"journal-title":"European Union Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)","year":"0","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"journal-title":"Restatement of the law Second Torts","first-page":"652\ufffd","year":"1977","key":"ref34"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2018.00103"},{"key":"ref62","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-26250-1_6","article-title":"A Survey on the Applicability of Safety, Security and Privacy Standards in Developing Dependable Systems","author":"shan","year":"2019","journal-title":"International Conference on Computer Safety Reliability and Security"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820716"},{"volume":"27000","journal-title":"Information technology &#x2014; security techniques &#x2014; information security management systems &#x2014; overview and vocabulary","year":"2009","key":"ref63"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.01.003"},{"volume":"29100","journal-title":"ISO 29100 Information technology &#x2014; Security techniques &#x2014; Privacy Framework","year":"2011","key":"ref64"},{"journal-title":"2019 CIGI-Ipsos Global Survey on Internet Security and Trust","year":"2019","key":"ref27"},{"volume":"27018","journal-title":"Information technology &#x2014; Security techniques &#x2014; Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors","year":"2014","key":"ref65"},{"volume":"29134","journal-title":"Information technology &#x2014; Security techniques &#x2014; Guidelines for privacy impact assessment","year":"2017","key":"ref66"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/bap.2017.3"},{"volume":"27701","journal-title":"Security techniques &#x2014; Extension to ISO\/IEC 27001 and ISO\/IEC 27002 for privacy information management &#x2014; Requirements and guidelines","year":"2019","key":"ref67"},{"key":"ref68","article-title":"Standardization Issues for the Internet of Things","author":"miloslavskaya","year":"2019","journal-title":"World Conference on Information Systems and Technologies"},{"journal-title":"Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks","year":"2019","key":"ref69"},{"journal-title":"When Things Start to Think","year":"1999","author":"gershenfeld","key":"ref2"},{"key":"ref1","article-title":"That &#x2018;Internet of Things&#x2019; Thing","author":"ashton","year":"2009","journal-title":"RFID Journal"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00567"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"100084","DOI":"10.1016\/j.iot.2019.100084","article-title":"Characterizing Internet of Things Systems through Taxonomies: A Systematic Mapping Study","volume":"7","author":"alkhabbas","year":"2019","journal-title":"Internet of Things"},{"key":"ref21","article-title":"Digital Forensics and Privacy-by-Design: Example in a Blockchain-Based Dynamic Navigation System","author":"billard","year":"2019","journal-title":"Annual Privacy Forum"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328736"},{"key":"ref23","article-title":"A decision framework for blockchain platforms for IoT and edge computing","author":"el ioini","year":"2018","journal-title":"SCITEPRESS"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-019-03170-4"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.046"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.03.001"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.002"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.10.002"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950872"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2017.09.003"},{"journal-title":"Towards an integrated privacy protection framework for IoT contextualising regulatory requirements with industry best practices","year":"2019","author":"thorburn","key":"ref59"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.19"},{"key":"ref57","article-title":"Designing privacy-aware internet of things applications","author":"perera","year":"2019","journal-title":"Information Sciences"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1093\/itnow\/bwz077"},{"key":"ref55","first-page":"247","volume":"3 2","author":"cavoukian","year":"2010","journal-title":"Privacy by design the definitive workshop A foreword by Ann Cavoukian"},{"journal-title":"Guidelines governing the protection of privacy and transborder flows of personal data","year":"1980","key":"ref54"},{"journal-title":"IoT Connected Living 2030","year":"0","key":"ref53"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2016.7945805"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"2575","DOI":"10.3390\/s18082575","article-title":"Blockchain and iot integration: A systematic survey","volume":"18 8","author":"panarello","year":"2018","journal-title":"SENSORS"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"3176","DOI":"10.1016\/j.sbspro.2012.06.032","article-title":"Self and identity: Raising undergraduate students&#x2019; awareness on their digital footprints","volume":"46","author":"camacho","year":"2012","journal-title":"Procedia-Social and Behavioral Sciences"},{"key":"ref12","first-page":"1676","article-title":"Applications of blockchains in the Internet of Things: A comprehensive survey","volume":"21 2","author":"ali","year":"2018","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1016\/j.procs.2019.08.101","article-title":"Blockchain-based IoT: A Survey","volume":"155","author":"thakore","year":"2019","journal-title":"Procedia Computer Science"},{"key":"ref14","article-title":"Business Models for Internet of Things Platforms: Empirical Development of a Taxonomy and Archetypes","author":"hodapp","year":"2019","journal-title":"AIS 14th Int&#x2019;l Conf on Wirtschaftsinformatik"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2018.10.014"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2014.7058837"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.043221010"},{"journal-title":"Digital Economy Report 2019 Value Creation and capture implications for developing countries","year":"2019","key":"ref81"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2018.8402353"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.023"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/SERP4IoT.2019.00017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3131542.3131563"},{"key":"ref80","article-title":"A survey on privacy protection in blockchain system","author":"feng","year":"2018","journal-title":"Journal of Network and Computer Applications"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2903-2_12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"journal-title":"ITU Internet Reports 2005&#x201D; The Internet of Things","year":"2005","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/jsan2020235"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3282308.3282312"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"164","DOI":"10.4236\/jcc.2015.35021","article-title":"Internet of Things (IoT): A literature review","volume":"3 5","author":"madakam","year":"2015","journal-title":"Journal of Computer and Communications"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1148-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2318835"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.060"},{"key":"ref87","doi-asserted-by":"crossref","DOI":"10.1145\/3278186.3278196","article-title":"Test patterns for IoT","author":"pontes","year":"2018","journal-title":"Proc of the 9th ACM SIGSOFT Int&#x2019;l Workshop on Automating TEST Case Design Selection and Evaluation"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00048"},{"key":"ref9","first-page":"121","article-title":"A review of security concerns in Internet of Things","volume":"5 1","author":"leloglu","year":"2016","journal-title":"Journal of Computer and Communications"},{"key":"ref46","article-title":"The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: A multiple-context investigation","author":"bansal","year":"2008","journal-title":"ICIS 2008 Proceedings"},{"key":"ref45","article-title":"Privacy by blockchain design: a blockchain-enabled GDPR-compliant approach for handling personal data","author":"wirth","year":"2018","journal-title":"Proc 1st ERCIM Blockchain Workshop"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-018-0113-4"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1515\/til-2019-0005"},{"journal-title":"Selling one&#x2019;s behavioral data An impossible market? (Research blog) Orange","year":"2017","author":"beauvisage","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300492"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.2019.1192"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2019,12,9]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09006341.pdf?arnumber=9006341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:56:03Z","timestamp":1658080563000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9006341\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":92,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9006341","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}