{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:30:09Z","timestamp":1725708609688},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/percomw.2014.6815237","type":"proceedings-article","created":{"date-parts":[[2014,5,16]],"date-time":"2014-05-16T19:05:08Z","timestamp":1400267108000},"page":"388-393","source":"Crossref","is-referenced-by-count":6,"title":["The value of consent: Discussions with designers of ubiquitous computing systems"],"prefix":"10.1109","author":[{"given":"Ewa","family":"Luger","sequence":"first","affiliation":[]},{"given":"Tom","family":"Rodden","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/365024.365034"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/503376.503448"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1093\/iwc\/iws017"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493446"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994366"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208562"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2010.21"},{"journal-title":"Focus Group Methodology","year":"2011","author":"liamputtong","key":"10"},{"journal-title":"ICO Privacy Electronic Communications Regulations Guidance on the Rules on Use of Cookies and Similar Technologies","year":"2011","key":"7"},{"key":"6","article-title":"Everyware: The dawning age of ubiquitous computing","author":"greenfield","year":"2006","journal-title":"Berkeley New Riders"},{"journal-title":"Pedagogy of the oppressed","year":"2000","author":"freire","key":"5"},{"key":"4","first-page":"503","article-title":"Informed consent by design","author":"friedman","year":"2008","journal-title":"Security and Usability"},{"journal-title":"Q&A NSA's Prism Internet Surveillance Scheme","year":"2013","author":"kelion","key":"9"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.4324\/9780203590447","author":"kamberelis","year":"2013","journal-title":"Focus Groups"}],"event":{"name":"2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)","start":{"date-parts":[[2014,3,24]]},"location":"Budapest, Hungary","end":{"date-parts":[[2014,3,28]]}},"container-title":["2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6805350\/6815123\/06815237.pdf?arnumber=6815237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T11:08:56Z","timestamp":1565435336000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6815237\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/percomw.2014.6815237","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}