{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T02:58:46Z","timestamp":1765421926564},"reference-count":19,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Technol. Soc. Mag."],"published-print":{"date-parts":[[2014]]},"DOI":"10.1109\/mts.2014.2364020","type":"journal-article","created":{"date-parts":[[2014,11,28]],"date-time":"2014-11-28T14:29:08Z","timestamp":1417184948000},"page":"73-80","source":"Crossref","is-referenced-by-count":39,"title":["Building Trust in the Human?Internet of Things Relationship"],"prefix":"10.1109","volume":"33","author":[{"given":"Ioannis","family":"Kounelis","sequence":"first","affiliation":[]},{"given":"Gianmarco","family":"Baldini","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Neisse","sequence":"additional","affiliation":[]},{"given":"Gary","family":"Steri","sequence":"additional","affiliation":[]},{"given":"Mariachiara","family":"Tallacchini","sequence":"additional","affiliation":[]},{"given":"Angela","family":"Guimaraes Pereira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Governance of ICT Security: A Perspective from the JRC","author":"guimar\u00e3es pereira","year":"0","journal-title":"Technical Report"},{"key":"ref11","article-title":"Position Statement on the Use of RFID on Consumer Products","author":"albrecht","year":"2003","journal-title":"Position Paper"},{"key":"ref12","article-title":"Reframing Rights. Bioconstitutionalism in the Genetic Age","author":"jasanoff","year":"2011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20485"},{"key":"ref14","article-title":"Secure interaction design and the principle of least authority","author":"yee","year":"0","journal-title":"Proc of the 21st Int Conf on Human Factors in Computing Systems &#x2013; Workshop on Human Computer Interaction and Security Systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.6821746"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2014.17"},{"key":"ref17","article-title":"Evidential reasoning with subjective logic","author":"j\u00f8sang","year":"0","journal-title":"Proc Fusion 2010 13th International Conference on Information Fusion"},{"key":"ref18","author":"j\u00f8sang","year":"0","journal-title":"Subjective Logic Book"},{"key":"ref19","article-title":"Model-Driven Risk Analysis, The CORAS Approach","author":"lund","year":"2010"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.3990\/1.9789036533362","article-title":"Trust and privacy management support for context-aware service platforms","author":"neisse","year":"2012"},{"key":"ref3","article-title":"The Dream of the Internet of Things","author":"benessia","year":"0","journal-title":"Guimar&#x00E3;es Pereira &#x00C2; & Funtowicz S Science Philosophy and Sustainability The end of the Cartesian Dream"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2012.2196340"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2013.2259311"},{"key":"ref8","author":"nowotny","year":"2001","journal-title":"Re-Thinking Science Knowledge and the Public in the Age of Uncertainty"},{"key":"ref7","article-title":"Agency in the Internet of Things. Scientific and Policy Report","author":"guimar\u00e3es pereira","year":"0"},{"key":"ref2","article-title":"ITU internet reports 2005: The internet of things","year":"2005","journal-title":"International Telecommunication Union report"},{"key":"ref1","article-title":"The electronic product code (epc) a naming scheme for physical objects","author":"brock","year":"2001"},{"key":"ref9","first-page":"1","article-title":"Opinion on Promoting Trust in the Information Society by Fostering Data Protection and Privacy (Opinion on Privacy By Design)","volume":"280","year":"2010","journal-title":"OJ C"}],"container-title":["IEEE Technology and Society Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/44\/6969174\/06969184.pdf?arnumber=6969184","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T15:59:26Z","timestamp":1642003166000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6969184"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":19,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/mts.2014.2364020","relation":{},"ISSN":["0278-0097"],"issn-type":[{"value":"0278-0097","type":"print"}],"subject":[],"published":{"date-parts":[[2014]]}}}