{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:19Z","timestamp":1750307959715,"version":"3.41.0"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2007,9,1]],"date-time":"2007-09-01T00:00:00Z","timestamp":1188604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["interactions"],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1145\/1288515.1288534","type":"journal-article","created":{"date-parts":[[2007,9,26]],"date-time":"2007-09-26T17:18:32Z","timestamp":1190827112000},"page":"26-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Ambient and pervasive technology"],"prefix":"10.1145","volume":"14","author":[{"given":"Anne M.","family":"Clarke","sequence":"first","affiliation":[{"name":"ETSI STF323\/Childaware"}]}],"member":"320","published-online":{"date-parts":[[2007,9]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"2","author":"Clarke A. M.","year":"2006","journal-title":"ETSI White Paper No"},{"doi-asserted-by":"publisher","key":"e_1_2_1_2_1","DOI":"10.1145\/1151314.1151335"},{"unstructured":"eSense Project; http:\/\/www.ist-e-sense.org\/  eSense Project; http:\/\/www.ist-e-sense.org\/","key":"e_1_2_1_3_1"},{"unstructured":"ETSI Technical Report 102 no. 133. \"Human Factors (HF); Access to ICT by young people: issues and guidelines.\" February 2003.  ETSI Technical Report 102 no. 133. \"Human Factors (HF); Access to ICT by young people: issues and guidelines.\" February 2003.","key":"e_1_2_1_4_1"},{"unstructured":"ETSI Guide 202 no. 423 \"Human Factors (HF); Guidelines for the design and deployment of ICT products and services used by children.\" October 2005.  ETSI Guide 202 no. 423 \"Human Factors (HF); Guidelines for the design and deployment of ICT products and services used by children.\" October 2005.","key":"e_1_2_1_5_1"},{"unstructured":"ETSI STF323 Initial Reports published June 2007 http:\/\/portal.etsi.org\/stfs\/STF_HomePages\/STF323\/STF323.asp  ETSI STF323 Initial Reports published June 2007 http:\/\/portal.etsi.org\/stfs\/STF_HomePages\/STF323\/STF323.asp","key":"e_1_2_1_6_1"},{"unstructured":"Green Hannah and Celia Hannon. \"Their space: education for a digital generation.\" 2007. http:\/\/www.demos.co.uk\/files\/Their%20space%20-%20web.pdf  Green Hannah and Celia Hannon. \"Their space: education for a digital generation.\" 2007. http:\/\/www.demos.co.uk\/files\/Their%20space%20-%20web.pdf","key":"e_1_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1145\/1125451.1125694"},{"unstructured":"STF 323 is an ETSI Specialist Task Force on \"Specification and guidelines for service providers on the provision of information services to young children.\" For more information see  http:\/\/portal.etsi.org\/stfs\/STF_HomePages\/STF323\/STF323.asp  STF 323 is an ETSI Specialist Task Force on \"Specification and guidelines for service providers on the provision of information services to young children.\" For more information see http:\/\/portal.etsi.org\/stfs\/STF_HomePages\/STF323\/STF323.asp","key":"e_1_2_1_9_1"},{"volume-title":"Northumbria University","year":"2007","author":"Wallace J.","key":"e_1_2_1_10_1"},{"unstructured":"ChildAware; http:\/\/www.childaware.eu  ChildAware; http:\/\/www.childaware.eu","key":"e_1_2_1_11_1"}],"container-title":["Interactions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1288515.1288534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1288515.1288534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:58:02Z","timestamp":1750258682000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1288515.1288534"}},"subtitle":["designing safeguards for vulnerable users"],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":11,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2007,9]]}},"alternative-id":["10.1145\/1288515.1288534"],"URL":"https:\/\/doi.org\/10.1145\/1288515.1288534","relation":{},"ISSN":["1072-5520","1558-3449"],"issn-type":[{"type":"print","value":"1072-5520"},{"type":"electronic","value":"1558-3449"}],"subject":[],"published":{"date-parts":[[2007,9]]},"assertion":[{"value":"2007-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}