{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T13:42:50Z","timestamp":1750513370387,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/icin.2011.6081097","type":"proceedings-article","created":{"date-parts":[[2011,11,21]],"date-time":"2011-11-21T16:46:31Z","timestamp":1321893991000},"page":"319-324","source":"Crossref","is-referenced-by-count":1,"title":["From &amp;#x201C;security for privacy&amp;#x201D; to &amp;#x201C;privacy for security&amp;#x201D;"],"prefix":"10.1109","author":[{"given":"Riccardo","family":"Bonazzi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Boris","family":"Fritscher","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhan","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yves","family":"Pigneur","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"year":"2010","author":"barabasi","article-title":"Authors@Google: albert laszlo barabasi","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1287\/isre.11.4.342.11872"},{"key":"ref12","article-title":"Say goodbye to all those passwords","author":"sterngold","year":"2011","journal-title":"BusinessWeek Online Magazine"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.4067\/S0718-18762011000200009"},{"year":"2009","author":"osterwalder","article-title":"Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.2307\/3172742"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICIN.2010.5640885"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1108\/14636690810874377"},{"key":"ref18","article-title":"On the systemic enterprise architecture methodology (SEAM","author":"wegmann","year":"0","journal-title":"Proceedings of the International Conference on Enterprise Information Systems (ICEIS) 2003"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.comnet.2005.07.007"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.2753\/MIS0742-1222240302"},{"key":"ref3","first-page":"85","article-title":"Context-aware computing applications","author":"schilit","year":"0","journal-title":"First Workshop on Mobile Computing Systems and Applications"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1653662.1653702"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/MPRV.2003.1186725"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/505282.505283"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1214\/ss\/1042727940","article-title":"Statistical fraud detection: A review","volume":"17","author":"bolton","year":"2002","journal-title":"Statistical Science"},{"key":"ref2","first-page":"50","article-title":"Consumer value of context aware and location based mobile services","author":"de vos","year":"0","journal-title":"Bled 2008 Proceedings"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/1753326.1753384"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s00779-008-0212-5"}],"event":{"name":"2011 15th International Conference on Intelligence in Next Generation Networks (ICIN): \"From Bits to Data, from Pipes to Clouds\"","start":{"date-parts":[[2011,10,4]]},"location":"Berlin, Germany","end":{"date-parts":[[2011,10,7]]}},"container-title":["2011 15th International Conference on Intelligence in Next Generation Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6066598\/6081051\/06081097.pdf?arnumber=6081097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T06:07:21Z","timestamp":1497938841000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6081097\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icin.2011.6081097","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}