{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T12:34:13Z","timestamp":1754483653424,"version":"3.28.0"},"reference-count":57,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icphys.2018.8390757","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T15:28:02Z","timestamp":1529940482000},"page":"509-516","source":"Crossref","is-referenced-by-count":13,"title":["Social ethics in Internet of Things: An outline and review"],"prefix":"10.1109","author":[{"given":"Amin","family":"Shahraki","sequence":"first","affiliation":[]},{"given":"Oystein","family":"Haugen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/978-1-4419-1674-7_38","article-title":"An overview of privacy and security issues in the internet of things","author":"medaglia","year":"2010","journal-title":"The Internet of Things"},{"key":"ref38","first-page":"1","article-title":"Demo: using malicious media files to compromise the security and privacy of smart TVs","author":"mich\u00e9le","year":"2014","journal-title":"Consumer Communications and Networking Conference (CCNC) 2014 IEEE 11th"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/SURV.2013.050113.00015","article-title":"Fairness in wireless networks: Issues, measures and challenges","volume":"16","author":"shi","year":"2014","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2013.05.010"},{"key":"ref31","article-title":"The real-time enterprise: Iot-enabled business processes","author":"haller","year":"2011","journal-title":"IETF IAB Workshop on Interconnecting Smart Objects with the Internet"},{"key":"ref30","volume":"180","author":"manyika","year":"2013","journal-title":"Disruptive Technologies Advances That Will Transform Life Business and the Global Economy"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2014.6785329"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/65.768484"},{"journal-title":"Proposed Concept for Ontology Communication between IoT Devices","year":"0","author":"shukla","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2525418"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_18"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"},{"journal-title":"Technological Diversification of ICT companies into the Internet of things (IoT) A Patent-based Analysis","year":"2016","author":"sadowski","key":"ref29"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.09.008"},{"key":"ref1","first-page":"97","article-title":"That'internet of things' thing","volume":"22","author":"ashton","year":"2009","journal-title":"RFID Journal"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6704479"},{"journal-title":"Proposals For The Secure Use Of IoT Technology In The Car Industry-Proposals on how to use IoT technology in the car industry but avoid its negative security consequences","year":"2016","author":"ramquist","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2014.03.001"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/CC.2014.6821746","article-title":"Trust management mechanism for Internet of Things","volume":"11","author":"lize","year":"2014","journal-title":"China Communications"},{"journal-title":"Tesla Autopilot Crash Why We Should Worry About a Single Death","year":"2016","author":"lin","key":"ref23"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.2298\/CSIS110303056C","article-title":"TRM-IoT: A trust management model based on fuzzy reputation for internet of things","volume":"8","author":"chen","year":"2011","journal-title":"Computer Science and Information Systems"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.jpdc.2014.08.004","article-title":"Reputation systems: A survey and taxonomy","volume":"75","author":"hendrikx","year":"2015","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2017.7915546"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/j.procs.2013.09.059","article-title":"Smart, autonomous and reliable Internet of Things","volume":"21","author":"kyriazis","year":"2013","journal-title":"Procedia Computer Science"},{"journal-title":"IoT enabled Insurance Ecosystem-Possibilities Challenges and Risks","year":"2015","author":"manral","key":"ref57"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2757384.2757397"},{"key":"ref55","first-page":"1","article-title":"Respecting context to protect privacy: Why meaning matters","author":"nissenbaum","year":"2015","journal-title":"Science and Engineering Ethics"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8090-5_14"},{"journal-title":"Does it help or hinder? Promotion of Innovation on the Internet and Citizens' Right to Privacy","year":"2011","author":"cave","key":"ref53"},{"key":"ref52","first-page":"6","article-title":"Development of IoT and Good Governance in Public Management [J]","volume":"1","author":"liren","year":"2011","journal-title":"Public Administration & Law"},{"key":"ref10","first-page":"1","article-title":"Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy","author":"house","year":"2012","journal-title":"The White House Washington DC USA"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.01.003"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","author":"nissenbaum","year":"2009","journal-title":"Privacy in context Technology policy and the integrity of social life Stanford University Press"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1126\/science.1249382"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1002\/9781119226079","author":"song","year":"2017","journal-title":"Security and Privacy in Cyber-Physical Systems Foundations Principles and Applications"},{"key":"ref14","first-page":"3","article-title":"Industrial Internet of Things and Cyber Manufacturing Systems","author":"jeschke","year":"2017","journal-title":"The Industrial Internet of Things"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-012-9293-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.06.005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1995.9508080335"},{"key":"ref19","first-page":"97","article-title":"From smart objects &#x201C; to&#x201D; social objects","volume":"52","author":"atzori","year":"2014","journal-title":"The Next Evolutionary Step of the Internet of Things IEEE Communications Magazine"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CECNet.2012.6201508"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2498304"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1016\/j.jnca.2012.12.028","article-title":"Opportunistic IoT: exploring the harmonious interaction between human and the internet of things","volume":"36","author":"guo","year":"2013","journal-title":"Journal of Network and Computer Applications"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1136\/bmj.323.7321.1103","article-title":"Ethical issues in qualitative research on internet communities","volume":"323","author":"eysenbach","year":"2001","journal-title":"BMJ"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2006.00318.x"},{"key":"ref9","article-title":"Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free movement of Such Data (General Data Protection Regulation)","author":"commission","year":"2012","journal-title":"COM (2012) 11 final 2012\/0011 (COD) Brussels 25 January 2012"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2012.6402298"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2013.33"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1111\/capa.12093"},{"journal-title":"Self-organizing networks (SON) self-planning self-optimization and self-healing for GSM UMTS and LTE John Wiley & Sons","year":"2011","author":"ramiro","key":"ref47"},{"key":"ref42","article-title":"The possibilities and challenges of the application and integration of the Internet of Things for future marketing practice","author":"klopper","year":"2016","journal-title":"University of Twente"},{"key":"ref41","first-page":"210","article-title":"Trusted IoT in the complex landscape of governance, security, privacy, availability and safety","author":"tragos","year":"2016","journal-title":"Digitising the Industry-Internet of Things Connecting the Physical Digital and Virtual Worlds River Publishers Series in Communications"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2529723"},{"key":"ref43","first-page":"1","article-title":"Ethical design in the internet of things","author":"baldini","year":"2016","journal-title":"Science and Engineering Ethics"}],"event":{"name":"2018 IEEE Industrial Cyber-Physical Systems (ICPS)","start":{"date-parts":[[2018,5,15]]},"location":"St. Petersburg","end":{"date-parts":[[2018,5,18]]}},"container-title":["2018 IEEE Industrial Cyber-Physical Systems (ICPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8376183\/8387624\/08390757.pdf?arnumber=8390757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T10:25:57Z","timestamp":1643192757000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8390757\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/icphys.2018.8390757","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}