{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:14:45Z","timestamp":1746245685586,"version":"3.37.3"},"reference-count":18,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/mc.2020.2968013","type":"journal-article","created":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T20:22:22Z","timestamp":1591215742000},"page":"44-52","source":"Crossref","is-referenced-by-count":4,"title":["Is Privacy Regulation Slowing Down Research on Pervasive Computing?"],"prefix":"10.1109","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1727-7650","authenticated-orcid":false,"given":"Claudio","family":"Bettini","sequence":"first","affiliation":[{"name":"Computer Science, Universita degli Studi di Milano, Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1835-3475","authenticated-orcid":false,"given":"Salil","family":"Kanhere","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, University of New South Wales, Sydney, New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8834-7388","authenticated-orcid":false,"given":"Marc","family":"Langheinrich","sequence":"additional","affiliation":[{"name":"Informatics, Universita della Svizzera italiana (USI), Lugano, Switzerland"}]},{"given":"Archan","family":"Misra","sequence":"additional","affiliation":[{"name":"Information Systems, Singapore Management University, Singapore"}]},{"given":"Delphine","family":"Reinhardt","sequence":"additional","affiliation":[{"name":"Computer Security and Privacy, University of Gottingen, Gottingen, Germany"}]}],"member":"263","reference":[{"journal-title":"Privacy Big Data and the Public Good Frameworks for Engagement","year":"2015","author":"lane","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6_23"},{"journal-title":"Privacy in Mobile and Pervasive Computing","year":"2018","author":"langheinrich","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","author":"nissenbaum","year":"2009","journal-title":"Privacy in Context Technology Policy and the Integrity of Social Life"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.75"},{"key":"ref15","first-page":"1880","article-title":"Privacy self-management and the consent dilemma","volume":"126","author":"solove","year":"2013","journal-title":"Harvard Law Rev"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2866769"},{"key":"ref17","first-page":"198","article-title":"What do IT professionals think about surveillance?","author":"szekely","year":"2011","journal-title":"Internet and Surveillance The Challenge of Web 2 0 and Social Media"},{"key":"ref18","first-page":"686","article-title":"The GDPR: The emperor&#x2019;s new clothes&#x2014;On the structural shortcomings of both the old and the new data protection law","volume":"10","author":"veil","year":"2018","journal-title":"Neue Zeitschrift f&#x00FC;r Verwaltungsrecht"},{"journal-title":"How much data is generated each day?","year":"2019","author":"desjardins","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.03.067"},{"key":"ref6","first-page":"3737","article-title":"What can I really do? Explaining the privacy paradox with online apathy","volume":"10","author":"hargittai","year":"2016","journal-title":"Int J Commun"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98161-1"},{"journal-title":"Privacy indexes A survey of Westin&#x2019;s studies","year":"2005","author":"kumaraguru","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819995"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.09.010"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2019.1583296"},{"key":"ref9","first-page":"2","author":"langheinrich","year":"2003","journal-title":"A troubadour approach to privacy"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/9107270\/09107297.pdf?arnumber=9107297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T20:02:24Z","timestamp":1651780944000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9107297\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":18,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/mc.2020.2968013","relation":{},"ISSN":["0018-9162","1558-0814"],"issn-type":[{"type":"print","value":"0018-9162"},{"type":"electronic","value":"1558-0814"}],"subject":[],"published":{"date-parts":[[2020,6]]}}}