{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T18:58:20Z","timestamp":1775156300474,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cec.2019.8790173","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T00:00:07Z","timestamp":1565308807000},"page":"3235-3243","source":"Crossref","is-referenced-by-count":8,"title":["Unlocking the Black Box of Wearable Intelligence: Ethical Considerations and Social Impact"],"prefix":"10.1109","author":[{"given":"Lauri","family":"Tuovinen","sequence":"first","affiliation":[]},{"given":"Alan F.","family":"Smeaton","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91485-5_3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3199201"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2659651.2659683"},{"key":"ref12","first-page":"1","article-title":"Unwinding Ariadne&#x2019;s identity thread: Privacy risks with fitness trackers and online social networks","author":"aktypi","year":"2017","journal-title":"Proceedings of the 1st International Workshop on Multimedia Privacy and Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60639-2_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1068-3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1543442"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2890529"},{"key":"ref17","year":"2019","journal-title":"The Modelica Website"},{"key":"ref18","author":"dataiku","year":"2019","journal-title":"Data website"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742800"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/4856506"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3389\/fphys.2013.00090"},{"key":"ref27","author":"poikola","year":"2017","journal-title":"Declaration of MyData principles"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0189298"},{"key":"ref6","article-title":"A comparison study of classifier algorithms for cross-person physical activity recognition","volume":"17","author":"saez","year":"2017","journal-title":"SENSORS"},{"key":"ref29","article-title":"Ontology-based negotiation and enforcement of privacy constraints in collaborative knowledge discovery","author":"tuovinen","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6579\/38\/2\/343"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2196\/10527"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2015.2432911"},{"key":"ref2","year":"2016","journal-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC.2018.8409635"},{"key":"ref1","first-page":"326","article-title":"Charter of fundamental rights of the European Union","year":"2012","journal-title":"Official Journal of the European Union"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7363784"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-014-9552-x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-013-9456-1"},{"key":"ref24","year":"2016","journal-title":"General wellness Policy for low risk devices Guidance for industry and Food and Drug Administration staff"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11229-008-9435-2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1188913.1188921"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013180410169"}],"event":{"name":"2019 IEEE Congress on Evolutionary Computation (CEC)","location":"Wellington, New Zealand","start":{"date-parts":[[2019,6,10]]},"end":{"date-parts":[[2019,6,13]]}},"container-title":["2019 IEEE Congress on Evolutionary Computation (CEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8778428\/8789744\/08790173.pdf?arnumber=8790173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:18:58Z","timestamp":1658157538000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8790173\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cec.2019.8790173","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}