{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T16:28:49Z","timestamp":1751560129211},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/etfa.2019.8869186","type":"proceedings-article","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T23:18:52Z","timestamp":1571354332000},"page":"1782-1789","source":"Crossref","is-referenced-by-count":12,"title":["SensiTrack - A Privacy by Design Concept for Industrial IoT Applications"],"prefix":"10.1109","author":[{"given":"Christian","family":"Jandl","sequence":"first","affiliation":[]},{"given":"Jamilya","family":"Nurgazina","sequence":"additional","affiliation":[]},{"given":"Lucas","family":"Schoffer","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Reichl","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Wagner","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Moser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Interaction Design Beyond Human-Computer Interaction","year":"2007","author":"sharp","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDACI.2017.8070819"},{"article-title":"Recommendation of the Council concerning Guidelines governing the Protection of Privacy and Transborder Flows of Personal Data","year":"2013","author":"regard","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2017\/v10i4\/110669"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6190-5_135"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CEWIT.2013.6713757"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2012.213"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49275-8_42"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1108\/BFJ-07-2017-0365"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/RFID-TA.2011.6068618"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2015.7312771"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12904"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.185"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0036"},{"journal-title":"Blockchain ready manufacturing supply chain using distributed ledger","year":"2016","author":"abeyratne","key":"ref1"},{"key":"ref20","first-page":"2643","article-title":"Wireless sensor network based asset tracking service","author":"kim","year":"2008","journal-title":"Port Int Conf on Management of Engineering Technology"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.279"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.506"},{"journal-title":"Research Methods in Human-computer Interaction","year":"2010","author":"lazar","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6_23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0054"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2006.111"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICICTA.2015.64"},{"journal-title":"Technical report Directive 95\/46\/EC","article-title":"On the protection of individuals with regard to the processing of personal data and on the free movement of such data","year":"1995","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSDA.2018.8477599"},{"key":"ref13","first-page":"1205","article-title":"Protecting privacy of BLE device users","author":"fawaz","year":"2016","journal-title":"Security Symposium (USENIX Security)"},{"key":"ref14","first-page":"38","article-title":"Augmented Reality for Industry 4.0: Architecture and User Experience","author":"jakl","year":"2018","journal-title":"Proc of the 11th Forum Media Technology 2018"},{"key":"ref15","article-title":"BlueDAT - A conceptual framework for smart asset tracking using Bluetooth 5 in industrial enviroment","author":"jandl","year":"2018","journal-title":"International symposium on Ambient intelligence and embedded systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42559-7_1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-China.2017.7990996"},{"journal-title":"Understanding GPS Principles and Applications","year":"2005","author":"kaplan","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.06.079"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0346-0"},{"key":"ref6","first-page":"7","article-title":"Cross-platform infovis frameworks for multiple users, screens and devices: Requirements and challenges","author":"blumenstein","year":"2015","journal-title":"Workshop on Data Exploration for Interactive Surfaces DEXIS 2015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.tifs.2017.01.013"},{"journal-title":"Privacy by Design in the Age of Big Data","year":"2012","author":"cavoukian","key":"ref8"},{"journal-title":"7 Foundational Principles","year":"2010","author":"cavoukian","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2794519"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IITA.2008.548"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICASI.2018.8394407"},{"key":"ref45","article-title":"KAVAGait: Knowledge-Assisted Visual Analytics for Clinical Gait Analysis","author":"wagner","year":"2018","journal-title":"Trans on Vis and Comp Graphics Early Access"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.phpro.2012.03.137"},{"article-title":"A Survey of Indoor Localization Systems and Technologies","year":"2017","author":"zafari","key":"ref47"},{"journal-title":"Information visualization Design for interaction","year":"2006","author":"spence","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2002.1043849"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.02.003"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2671491.2671498"}],"event":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2019,9,10]]},"location":"Zaragoza, Spain","end":{"date-parts":[[2019,9,13]]}},"container-title":["2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8851311\/8868236\/08869186.pdf?arnumber=8869186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:49:10Z","timestamp":1658155750000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8869186\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/etfa.2019.8869186","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}