{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T23:07:55Z","timestamp":1730243275346,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/icgs3.2019.8688024","type":"proceedings-article","created":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T06:09:15Z","timestamp":1555049355000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["The Internet of Things: Implications for Consumer Privacy &amp; Security"],"prefix":"10.1109","author":[{"given":"Sherese","family":"Bishop","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/0267257X.2016.1245212"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.07.016"},{"key":"ref12","first-page":"94","article-title":"The computer for the 21st century","volume":"1","author":"weiser","year":"1991","journal-title":"Scientific American Special Issue on Communications Computers and Networks"},{"key":"ref13","first-page":"85","article-title":"Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent","volume":"93","author":"peppet","year":"2014","journal-title":"Texas Law Review"},{"journal-title":"Vision and Challenges for Realising the Internet of Things","year":"2010","author":"sundmaeker","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.06.005"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30090-3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-014-2248-y"},{"journal-title":"Privacy in the Information Age","year":"1997","author":"cate","key":"ref4"},{"key":"ref3","first-page":"3","article-title":"Handling privacy and security in the internet of things","author":"britton","year":"2016","journal-title":"Journal of Internet Law"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.04.023"},{"key":"ref5","article-title":"Commodifying Consumer Data in the Era of the Internet of Things","author":"elvy","year":"2018","journal-title":"Boston College Law Review"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.chb.2018.11.022","article-title":"Willingness to provide personal information: Perspective of privacy calculus in iot services","volume":"92","author":"kim","year":"2018","journal-title":"Computers in Human Behavior"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2307\/1229286"},{"journal-title":"Privacy e-mail Message to [Sherese Bishop]","article-title":"Re : An update to your privacy notice","year":"2018","key":"ref2"},{"key":"ref1","first-page":"1023","article-title":"Seduction by technology: Why consumers opt out of privacy by buying into the internet of things","author":"bailey","year":"2015","journal-title":"Texas Law Review"},{"key":"ref9","first-page":"21","article-title":"Factors influencing purchase of smart appliances in smart homes","volume":"24","author":"maddulety","year":"2017","journal-title":"Journal of Accounting-Business and Management"}],"event":{"name":"2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)","start":{"date-parts":[[2019,1,16]]},"location":"London, United Kingdom","end":{"date-parts":[[2019,1,18]]}},"container-title":["2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8672787\/8688013\/08688024.pdf?arnumber=8688024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:12:51Z","timestamp":1657854771000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8688024\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icgs3.2019.8688024","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}