{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:08:08Z","timestamp":1730221688755,"version":"3.28.0"},"reference-count":97,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010661","name":"European Union's Horizon 2020 research and innovation programme","doi-asserted-by":"publisher","award":["861091"],"award-info":[{"award-number":["861091"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/fg59268.2024.10582034","type":"proceedings-article","created":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:40:08Z","timestamp":1720719608000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["What Should we Care About in AAL? Unveiling the Main Interests of the Users in the Legal Context"],"prefix":"10.1109","author":[{"given":"Maksymilian M.","family":"Ku\u017amicz","sequence":"first","affiliation":[{"name":"The Swedish Law and Informatics Research Institute, Stockholm University,Stockholm,Sweden"}]}],"member":"263","reference":[{"key":"ref1","article-title":"State of the art of audio-and video-based solutions for aal","author":"Aleksic","year":"2022","journal-title":"arXiv preprint"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19312-0_13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195158427.001.0001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024166912191"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1177\/003232927100100201"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.54941\/ahfe1001638"},{"issue":"4","key":"ref7","article-title":"Security issues in internet of things (iot): A survey","volume":"5","author":"Balte","year":"2015","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"volume-title":"Principles of biomedical ethics","year":"2001","author":"Beauchamp","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph19116804"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/aristotelian\/76.1.109"},{"key":"ref11","article-title":"Rechtsprechung und materielle Rechtskraft: verwal-tungsrechtliche Studien","author":"Bernatzik","year":"1886","journal-title":"Manz"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20901-2_13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107249"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1353\/pbm.2003.0049"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2010.07.002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3233\/AIS-170471"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/13467581.2019.1617718"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2021.104461"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/14639230410001684387"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3233\/shti210263"},{"issue":"178","key":"ref21","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1017\/S0031819100016934","volume":"46","author":"Downie","year":"1971","journal-title":"Autonomy. Philosophy"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COASE.2016.7743474"},{"key":"ref23","first-page":"233","article-title":"Redefining privacy","volume":"12","author":"Gerety","year":"1977","journal-title":"Harvard Civil Rights-Civil Liberties Law Review"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2752\/175630614X14056185480186"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1177\/1356389017697615"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1186\/s12910-019-0417-3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2019.03.016"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0277-9536(98)00009-4"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1515\/9783110873030"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3389\/fbioe.2020.00415"},{"key":"ref31","article-title":"Data security and privacy in cloud computing: concepts and emerging trends","author":"Gupta","year":"2021","journal-title":"arXiv preprint"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S1474-6670(17)52137-0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1989.tb01225.x"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-011-0014-y"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1076\/iaij.3.1.50.7408"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11019-022-10126-8"},{"journal-title":"D1. 6. active assisted living-legal tectonic plates white paper on the legal framework for video-based assisted technologies","year":"2022","author":"He","key":"ref37"},{"issue":"2","key":"ref38","first-page":"109","article-title":"Interpreting the international right to health in a human rights-based approach to health","volume":"18","author":"Hunt","year":"2016","journal-title":"Health and Human Rights"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3190373"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26005-1_11"},{"key":"ref41","first-page":"463","article-title":"The influence of privacy on the acceptance of technologies for assisted living. In Human Aspects of IT for the Aged Population","volume-title":"Healthy and Active Aging: 6th International Conference, ITAP 2020, Held as Part of the 22nd HCI International Conference, HCII 2020","author":"Jaschinski"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1257\/aer.20191330"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2021.1921365"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.354"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2022.105742"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1017\/S026646231300041X"},{"key":"ref47","first-page":"271","article-title":"The inalienability of autonomy","author":"Kuflik","year":"1984","journal-title":"Philosophy & Public Affairs"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s44206-023-00080-0"},{"journal-title":"Multilayer information obligation, and why we need it","year":"2023","author":"Ku\u017amicz","key":"ref49"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3389\/fdgth.2022.891634"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2015.10.003"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1515\/til-2019-0007"},{"key":"ref53","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195123333.001.0001","volume-title":"Relational autonomy: Feminist perspectives on autonomy, agency, and the social self","author":"Mackenzie","year":"2000"},{"key":"ref54","article-title":"Evaluation of aal-technologies: Status quo and perspectives","volume":"1","author":"M\u00e4hs","year":"2022","journal-title":"Global Business & Economics Anthology"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.5220\/0011046200003188"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1186\/s40638-017-0074-2"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46608-8_8"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1201\/9781003215349-5"},{"volume-title":"The Assault on Privacy: Computers, Data Banks, and Dossiers","year":"1971","author":"Miller","key":"ref59"},{"key":"ref60","article-title":"Technological solutions for ambient assisted living (aal) & active and healthy ageing (aha)","volume-title":"Meet in Italy for Life Sciences","author":"Moroni","year":"2021"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2016.04.049"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.2196\/45297"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.3389\/fpubh.2019.00134"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-4356(02)00601-7"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.5220\/0011058300003188"},{"volume-title":"Report of the pilot results","year":"2013","author":"Papa","key":"ref66"},{"key":"ref67","first-page":"1","article-title":"Digital remedies","volume":"35","author":"Perel","year":"2020","journal-title":"Berkeley Tech. LJ."},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1080\/17538157.2021.1923500"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389141"},{"volume-title":"The economics of justice","year":"1983","author":"Posner","key":"ref70"},{"key":"ref71","first-page":"2087","article-title":"Three concepts of privacy","volume":"89","author":"Post","year":"2000","journal-title":"Geo. LJ"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15775-2"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.09.236"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v25i7.10844"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1093\/jmp\/jhz001"},{"key":"ref76","first-page":"1061","article-title":"Privacy costs and personal data protection: Economic and legal perspectives","volume":"24","author":"Romanosky","year":"2009","journal-title":"Berkeley Tech. LJ"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0198112"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.15394\/jdfsl.2017.1476"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-50309-3_34"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2022.2078463"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.10209"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2017.01.012"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195158557.001.0001"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.2307\/3481326"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.18574\/nyu\/9780814708965.001.0001"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2009.08.001"},{"volume-title":"Interest","year":"2005","author":"Swedberg","key":"ref87"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.5220\/0006380701040116"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1080\/13600869.2017.1298501"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.puhe.2021.01.001"},{"key":"ref91","first-page":"803","article-title":"Optimizing breach notification","author":"Verstraete","year":"2021","journal-title":"U. Ill. L. Rev."},{"key":"ref92","first-page":"66","article-title":"The right to privacy","volume":"1","author":"Warren","year":"1968","journal-title":"Kingston L. Rev."},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/234313.234424"},{"issue":"1","key":"ref94","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin","year":"1968","journal-title":"Washington and Lee Law Review"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1177\/0733464807311435"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.2105\/ajph.36.11.1315"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.4108\/icst.pervasivehealth.2011.246044"}],"event":{"name":"2024 IEEE 18th International Conference on Automatic Face and Gesture Recognition (FG)","start":{"date-parts":[[2024,5,27]]},"location":"Istanbul, Turkiye","end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 IEEE 18th International Conference on Automatic Face and Gesture Recognition (FG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10581880\/10581860\/10582034.pdf?arnumber=10582034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T05:05:28Z","timestamp":1721279128000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10582034\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":97,"URL":"https:\/\/doi.org\/10.1109\/fg59268.2024.10582034","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}