{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:42:19Z","timestamp":1750308139405,"version":"3.41.0"},"reference-count":6,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2006,1,10]],"date-time":"2006-01-10T00:00:00Z","timestamp":1136851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2006,1,10]]},"abstract":"<jats:p>Monitoring, and command,communications and control of private vehicles on the public highway is now high on the political agenda. This is both because it is becoming feasible, and because it may be desirable. From the economic perspective, more efficient se of road resources may be achievable. From a safety perspective, it would clearly be good to reduce road injury and death statistics below the current \"9\/11\"'s-worth per year in the UK (and other similar sized European countries).Various prototypes, proposals and projects are being undertaken. There are a number of technologies that interact as well as numerous legal, political and economic stakeholders. In this note, we pay particular attention to the impact on privacy and safety of di .erent approaches to the overall problem.The purpose is to draw attention to the potential unintended consequences that result from decisions being made at the time of writing, in this arena.<\/jats:p>","DOI":"10.1145\/1111322.1111335","type":"journal-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T18:14:10Z","timestamp":1139249650000},"page":"53-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The privacy and safety impact of technology choices for command, communications and control of the public highway"],"prefix":"10.1145","volume":"36","author":[{"given":"Jon","family":"Crowcroft","sequence":"first","affiliation":[{"name":"University of Cambridge, Cambridge, UK"}]}],"member":"320","published-online":{"date-parts":[[2006,1,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633059"},{"key":"e_1_2_1_2_1","unstructured":"John Doyle. Highly optimized tolerance. http:\/\/www.physics.ucsb.edu\/~complex\/ 2005.  John Doyle. Highly optimized tolerance. http:\/\/www.physics.ucsb.edu\/~complex\/ 2005."},{"key":"e_1_2_1_3_1","unstructured":"Transport for London. Transport for london congestion charging technology trial report. http:\/\/www.tfl.gov.uk\/tfl\/downloads\/pdf\/congestion-charging\/technology-%trials.pdf 2004.  Transport for London. Transport for london congestion charging technology trial report. http:\/\/www.tfl.gov.uk\/tfl\/downloads\/pdf\/congestion-charging\/technology-%trials.pdf 2004."},{"key":"e_1_2_1_4_1","volume-title":"http:\/\/www.raeng.org.uk\/policy\/reports\/pdf\/Transport_2050.pdf","author":"Royal Academy of Engineering. Transport 2050.","year":"2005","unstructured":"Royal Academy of Engineering. Transport 2050. http:\/\/www.raeng.org.uk\/policy\/reports\/pdf\/Transport_2050.pdf , 2005 . Royal Academy of Engineering. Transport 2050. http:\/\/www.raeng.org.uk\/policy\/reports\/pdf\/Transport_2050.pdf, 2005."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of Worksho on Hot Topics in Networks (HotNets-IV),November","author":"Parno Bryan","year":"2005","unstructured":"Bryan Parno and Adrian Perrig . Challenges in securing vehicular networks . In Proceedings of Worksho on Hot Topics in Networks (HotNets-IV),November 2005 . Bryan Parno and Adrian Perrig. Challenges in securing vehicular networks. In Proceedings of Worksho on Hot Topics in Networks (HotNets-IV),November 2005."},{"key":"e_1_2_1_6_1","unstructured":"Heathcote Williams. Autogeddon. Jonathan Cape 1991.  Heathcote Williams. Autogeddon. Jonathan Cape 1991."}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1111322.1111335","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1111322.1111335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:39Z","timestamp":1750262919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1111322.1111335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,1,10]]},"references-count":6,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,1,10]]}},"alternative-id":["10.1145\/1111322.1111335"],"URL":"https:\/\/doi.org\/10.1145\/1111322.1111335","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2006,1,10]]},"assertion":[{"value":"2006-01-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}