{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:03:46Z","timestamp":1729613026601,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/icdim.2008.4746842","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T15:29:46Z","timestamp":1232119786000},"page":"827-837","source":"Crossref","is-referenced-by-count":6,"title":["Privacy in context: Privacy issues in Ubiquitous Computing applications"],"prefix":"10.1109","author":[{"given":"Ciaran","family":"O'Driscoll","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765952"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1047671.1047705"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/632716.632752"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186726"},{"year":"0","key":"16"},{"year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.2005.1452707"},{"journal-title":"Privacy and Freedom","year":"1967","author":"westin","key":"11"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1145\/1054972.1054986","article-title":"privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing","author":"iachello","year":"2005","journal-title":"Proceedings of the SIGCHI conference on Human factors in computing systems"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124894"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1145\/1054972.1054987","article-title":"who gets to know what when: configuring privacy permissions in an awareness application","author":"patil","year":"2005","journal-title":"Proceedings of the SIGCHI conference on Human factors in computing systems"},{"key":"22","article-title":"security, privacy and trust - mission impossible?","author":"small","year":"2008","journal-title":"3rd Internationational Conference for Internet Technology and Secured Transactions ICITST"},{"year":"0","key":"23"},{"journal-title":"Newsletter Urgent development affecting RFID and consumer privacy","year":"0","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0213-4"},{"year":"0","key":"26"},{"key":"27","article-title":"deploying a context aware smart classroom","author":"o'driscoll","year":"2008","journal-title":"International Technology Education and Development InTED '08"},{"year":"0","key":"28"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1291233.1291389"},{"key":"2","article-title":"a survey of research on context -aware homes","volume":"21","author":"meyer","year":"2003","journal-title":"Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003"},{"key":"10","article-title":"privacy by design - principles of privacy-aware ubiquitous systems","author":"langheinrich","year":"2001","journal-title":"Proceedings of the Third International Conference on Ubiquitous Computing (UbiComp"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1203752"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0304-9"},{"journal-title":"Newsletter Spyshipped Levi's brand Jeans hit the","year":"0","key":"6"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013129"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"}],"event":{"name":"2008 Third International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2008,11,13]]},"location":"London, United Kingdom","end":{"date-parts":[[2008,11,16]]}},"container-title":["2008 Third International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733742\/4746691\/04746842.pdf?arnumber=4746842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T03:51:04Z","timestamp":1632973864000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4746842\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icdim.2008.4746842","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}