{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:08Z","timestamp":1750221068259,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T00:00:00Z","timestamp":1538956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/M001636\/1,EP\/N028260\/1"],"award-info":[{"award-number":["EP\/M001636\/1,EP\/N028260\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,8]]},"DOI":"10.1145\/3267305.3274151","type":"proceedings-article","created":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T19:05:14Z","timestamp":1541099114000},"page":"901-910","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["IoT App Development"],"prefix":"10.1145","author":[{"given":"Tom","family":"Lodge","sequence":"first","affiliation":[{"name":"University of Nottingham, School of Computer Science, Nottingham, UK"}]},{"given":"Andy","family":"Crabtree","sequence":"additional","affiliation":[{"name":"University of Nottingham, School of Computer Science, Nottingham, UK"}]},{"given":"Anthony","family":"Brown","sequence":"additional","affiliation":[{"name":"University of Nottingham, Horizon Digital Economy Research, Nottingham, UK"}]}],"member":"320","published-online":{"date-parts":[[2018,10,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"Assistant Home","year":"2018","unstructured":"Home Assistant . 2018 . Home Assistant. (2018) . Retrieved July 26, 2018 from https:\/\/www.home-assistant.io. Home Assistant. 2018. Home Assistant. (2018). Retrieved July 26, 2018 from https:\/\/www.home-assistant.io."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.7146\/aahcc.v1i1.21312"},{"volume-title":"https:\/\/data.gov.uk\/library\/mydex. (Apr","year":"2017","key":"e_1_3_2_1_3_1","unstructured":"data.gov.uk Library. 2017. MyDex. https:\/\/data.gov.uk\/library\/mydex. (Apr 2017 ). data.gov.uk Library. 2017. MyDex. https:\/\/data.gov.uk\/library\/mydex. (Apr 2017)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0098790"},{"key":"e_1_3_2_1_5_1","volume-title":"Slave to the Algorithm: Why a Right to an Explanation Is Probably Not the Remedy You Are Looking for. Duke Law &amp","author":"Edwards Lilian","year":"2017","unstructured":"Lilian Edwards and Michael Veale . 2017. Slave to the Algorithm: Why a Right to an Explanation Is Probably Not the Remedy You Are Looking for. Duke Law &amp ; Technology Review 16 ( 2017 ), 18. Lilian Edwards and Michael Veale. 2017. Slave to the Algorithm: Why a Right to an Explanation Is Probably Not the Remedy You Are Looking for. Duke Law &amp; Technology Review 16 (2017), 18."},{"volume-title":"Retrieved","year":"2018","key":"e_1_3_2_1_6_1","unstructured":"Google. 2018 . Attacking Discrimination in ML. (2018) . Retrieved July 26, 2018 from https:\/\/research.google.com\/bigpicture\/attacking-discrimination-in-ml. Google. 2018. Attacking Discrimination in ML. (2018). Retrieved July 26, 2018 from https:\/\/research.google.com\/bigpicture\/attacking-discrimination-in-ml."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2805830"},{"key":"e_1_3_2_1_8_1","volume-title":"Retrieved","author":"IFTTT.","year":"2018","unstructured":"IFTTT. 2018 . IFTTT. (2018) . Retrieved July 26, 2018 from https:\/\/ifttt.com. IFTTT. 2018. IFTTT. (2018). Retrieved July 26, 2018 from https:\/\/ifttt.com."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE\/ACM Symposium on. IEEE, 1--13","author":"Liu Peng","year":"2016","unstructured":"Peng Liu , Dale Willis , and Suman Banerjee . 2016 . Paradrop: Enabling lightweight multi-tenancy at the network's extreme edge. In Edge Computing (SEC) , IEEE\/ACM Symposium on. IEEE, 1--13 . Peng Liu, Dale Willis, and Suman Banerjee. 2016. Paradrop: Enabling lightweight multi-tenancy at the network's extreme edge. In Edge Computing (SEC), IEEE\/ACM Symposium on. IEEE, 1--13."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 1st International Workshop on Software Engineering for Parallel and Distributed Systems. 25--29","author":"Morrison J Paul","year":"1994","unstructured":"J Paul Morrison . 1994 . Flow-based programming . In Proceedings of the 1st International Workshop on Software Engineering for Parallel and Distributed Systems. 25--29 . J Paul Morrison. 1994. Flow-based programming. In Proceedings of the 1st International Workshop on Software Engineering for Parallel and Distributed Systems. 25--29."},{"volume-title":"Retrieved","year":"2018","key":"e_1_3_2_1_12_1","unstructured":"Mozilla. 2018 . Project Things. (2018) . Retrieved July 26, 2018 from https:\/\/iot.mozilla.org. Mozilla. 2018. Project Things. (2018). Retrieved July 26, 2018 from https:\/\/iot.mozilla.org."},{"key":"e_1_3_2_1_13_1","unstructured":"Mark W Newman. 2006. Now we're cooking: Recipes for end-user service composition in the digital home. (2006).  Mark W Newman. 2006. Now we're cooking: Recipes for end-user service composition in the digital home. (2006)."},{"volume-title":"The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. In 2018 IEEE Symposium on Security and Privacy (SP). 634--647","author":"Oltrogge M.","key":"e_1_3_2_1_14_1","unstructured":"M. Oltrogge , E. Derr , C. Stransky , Y. Acar , S. Fahl , C. Rossow , G. Pellegrino , S. Bugiel , and M. Backes . 2018 . The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. In 2018 IEEE Symposium on Security and Privacy (SP). 634--647 . M. Oltrogge, E. Derr, C. Stransky, Y. Acar, S. Fahl, C. Rossow, G. Pellegrino, S. Bugiel, and M. Backes. 2018. The Rise of the Citizen Developer: Assessing the Security Impact of Online App Generators. In 2018 IEEE Symposium on Security and Privacy (SP). 634--647."},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"HAB.","year":"2018","unstructured":"Open HAB. 2018 . OpenHAB. (2018) . Retrieved July 26, 2018 from https:\/\/www.openhab.org. OpenHAB. 2018. OpenHAB. (2018). Retrieved July 26, 2018 from https:\/\/www.openhab.org."},{"volume-title":"Retrieved","year":"2018","key":"e_1_3_2_1_16_1","unstructured":"Stringify. 2018 . Stringify. (2018) . Retrieved July 26, 2018 from https:\/\/www.stringify.com. Stringify. 2018. Stringify. (2018). Retrieved July 26, 2018 from https:\/\/www.stringify.com."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052709"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2003653.2003660"},{"volume-title":"Retrieved","year":"2018","key":"e_1_3_2_1_19_1","unstructured":"Wikipedia. 2018 a. Apple HomeKit. (2018) . Retrieved July 26, 2018 from https:\/\/en.wikipedia.org\/wiki\/HomeKit. Wikipedia. 2018a. Apple HomeKit. (2018). Retrieved July 26, 2018 from https:\/\/en.wikipedia.org\/wiki\/HomeKit."},{"volume-title":"Retrieved","year":"2018","key":"e_1_3_2_1_20_1","unstructured":"Wikipedia. 2018 b. Samsung Smart Things. (2018) . Retrieved July 26, 2018 from https:\/\/en.wikipedia.org\/wiki\/SmartThings. Wikipedia. 2018b. Samsung Smart Things. (2018). Retrieved July 26, 2018 from https:\/\/en.wikipedia.org\/wiki\/SmartThings."},{"volume-title":"Retrieved","year":"2018","key":"e_1_3_2_1_21_1","unstructured":"Yeti. 2018 . Yeti. (2018) . Retrieved July 26, 2018 from https:\/\/getyeti.co. Yeti. 2018. Yeti. (2018). Retrieved July 26, 2018 from https:\/\/getyeti.co."},{"volume-title":"Retrieved","year":"2018","key":"e_1_3_2_1_22_1","unstructured":"Zapier. 2018 . Zapier. (2018) . Retrieved July 26, 2018 from https:\/\/zapier.com. Zapier. 2018. Zapier. (2018). Retrieved July 26, 2018 from https:\/\/zapier.com."}],"event":{"name":"UbiComp '18: The 2018 ACM International Joint Conference on Pervasive and Ubiquitous Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","University of Florida University of Florida","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGSPATIAL ACM Special Interest Group on Spatial Information"],"location":"Singapore Singapore","acronym":"UbiComp '18"},"container-title":["Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267305.3274151","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3267305.3274151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:19Z","timestamp":1750208239000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267305.3274151"}},"subtitle":["Supporting Data Protection by Design and Default"],"short-title":[],"issued":{"date-parts":[[2018,10,8]]},"references-count":22,"alternative-id":["10.1145\/3267305.3274151","10.1145\/3267305"],"URL":"https:\/\/doi.org\/10.1145\/3267305.3274151","relation":{},"subject":[],"published":{"date-parts":[[2018,10,8]]},"assertion":[{"value":"2018-10-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}