{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T06:33:12Z","timestamp":1725777192629},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/giots.2017.8016284","type":"proceedings-article","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T20:56:20Z","timestamp":1503608180000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["When things are sensors for cloud AI: Protecting privacy through data collection transparency in the age of digital assistants"],"prefix":"10.1109","author":[{"given":"Paul G.","family":"Flikkema","sequence":"first","affiliation":[]},{"given":"Bertrand","family":"Cambou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Organization for Economic Co-operation and Development","article-title":"The OECD privacy framework","year":"2013","key":"ref4"},{"journal-title":"Tech Rep","article-title":"Internet of things (IoT) security and privacy recommendations","year":"2016","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2335155"},{"journal-title":"The Future of Privacy Forum","article-title":"Best practices for consumer wearables & wellness apps & devices","year":"2016","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.10"},{"journal-title":"White House United States of America","article-title":"Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy","year":"2012","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5246"},{"key":"ref7","article-title":"Follow my recommendations: A personalized privacy assistant for mobile app permissions","author":"liu","year":"2016","journal-title":"2016 Symposium on Usable Privacy and Security (SOUPS) 2016"},{"key":"ref2","article-title":"Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World","author":"schneier","year":"2016","journal-title":"W W Norton & Company"},{"key":"ref9","article-title":"A XOR data compiler combined with physical unclonable function for true random number generation","author":"cambou","year":"2017","journal-title":"SAI\/IEEE Computing Conference"},{"journal-title":"The state of privacy in post-Snowden America","year":"2016","author":"rainie","key":"ref1"}],"event":{"name":"2017 Global Internet of Things Summit (GIoTS)","start":{"date-parts":[[2017,6,6]]},"location":"Geneva, Switzerland","end":{"date-parts":[[2017,6,9]]}},"container-title":["2017 Global Internet of Things Summit (GIoTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8011434\/8016205\/08016284.pdf?arnumber=8016284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,7]],"date-time":"2017-09-07T04:49:52Z","timestamp":1504759792000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8016284\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/giots.2017.8016284","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}