{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:30:14Z","timestamp":1767339014635,"version":"3.40.4"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/eucnc.2017.7980650","type":"proceedings-article","created":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T20:46:05Z","timestamp":1500324365000},"page":"1-6","source":"Crossref","is-referenced-by-count":14,"title":["From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges"],"prefix":"10.1109","author":[{"given":"Tanesh","family":"Kumar","sequence":"first","affiliation":[{"name":"Centre for Wireless Communications (CWC), University of Oulu, Finland"}]},{"given":"Madhusanka","family":"Liyanage","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications (CWC), University of Oulu, Finland"}]},{"given":"An","family":"Braeken","sequence":"additional","affiliation":[{"name":"Industrial Engineering INDI, Vrije Universiteit Brussel VUB, Nijverheidskaai 170, 1070 Brussel, Belgium"}]},{"given":"Ijaz","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications (CWC), University of Oulu, Finland"}]},{"given":"Mika","family":"Ylianttila","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications (CWC), University of Oulu, Finland"}]}],"member":"263","reference":[{"key":"ref10","first-page":"157166","article-title":"Freedom and privacy in ambient intelligence, Ethics and Information Technology","volume":"7","author":"brey","year":"2005"},{"key":"ref11","first-page":"7383","article-title":"Security and privacy consideration for internet of things in smart home environments","volume":"10","author":"drushti","year":"2014","journal-title":"International Journal of Engineering Research and Development"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.09.010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.01.003"},{"key":"ref14","first-page":"163175","volume":"18","author":"wernke","year":"2014","journal-title":"A classification of location privacy attacks and approaches Personal and Ubiquitous Computing"},{"key":"ref15","article-title":"A unified framework for location privacy","author":"shokri","year":"2010","journal-title":"in In 3rd Hot Topics in Privacy Enhancing Technologies (HotPETs)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14257\/ijsh.2015.9.9.19"},{"key":"ref17","article-title":"Identity Privacy Preserving Biometric Based Authentication Scheme for Naked Healthcare Environment","author":"tanesh","year":"2017","journal-title":"ICC"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5772\/50912"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2512500"},{"key":"ref4","article-title":"Privacy Revelations for Web and Mobile Apps","author":"wetherall","year":"2011","journal-title":"HOTOS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2013.11.005"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2010.09.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/159544.159617"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1185214"},{"year":"0","key":"ref2","article-title":"The Naked Approach, Nordic Perspective to Gadget-free Hypercon-nected Environments"},{"article-title":"On the Road to Digital Paradise","year":"2016","author":"aikio","key":"ref1"},{"key":"ref9","first-page":"191201","article-title":"Ambient intelligence: applications and privacy policies, in Highlights of Practical Applications of Heterogeneous Multi-Agent Systems","author":"lopez","year":"2014","journal-title":"The PAAMS Collection Springer"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-012-9293-y"},{"journal-title":"FTC Report","article-title":"Protecting Consumer Privacy in an Era of Rapid Change","year":"0","key":"ref21"}],"event":{"name":"2017 European Conference on Networks and Communications (EuCNC)","start":{"date-parts":[[2017,6,12]]},"location":"Oulu, Finland","end":{"date-parts":[[2017,6,15]]}},"container-title":["2017 European Conference on Networks and Communications (EuCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7972783\/7980636\/07980650.pdf?arnumber=7980650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T17:54:22Z","timestamp":1744394062000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7980650\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/eucnc.2017.7980650","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}