{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T00:10:20Z","timestamp":1736295020638,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333760"},{"type":"electronic","value":"9783540333777"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734666_10","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T12:10:32Z","timestamp":1141906232000},"page":"119-133","source":"Crossref","is-referenced-by-count":11,"title":["The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues"],"prefix":"10.1007","author":[{"given":"Michael","family":"Friedewald","sequence":"first","affiliation":[]},{"given":"Elena","family":"Vildjiounaite","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Punie","sequence":"additional","affiliation":[]},{"given":"David","family":"Wright","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"IST Advisory Group, Ducatel, K., Bogdanovicz, M., Scapolo, F., Leijten, J., Burgelman, J.C.: Scenarios for ambient intelligence in 2010. Institute for Prospective Technological Studies (IPTS), Seville (2001), http:\/\/www.cordis.lu\/ist\/istag-reports.htm"},{"key":"10_CR2","first-page":"141","volume":"57","author":"Y. Punie","year":"2005","unstructured":"Punie, Y.: The future of ambient intelligence in Europe: The need for more everyday life. Communications and Strategies\u00a057, 141\u2013165 (2005)","journal-title":"Communications and Strategies"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/159544.159617","volume":"36","author":"M. Weiser","year":"1993","unstructured":"Weiser, M.: Some computer science issues in ubiquitous computing. Communications of the ACM\u00a036, 75\u201385 (1993)","journal-title":"Communications of the ACM"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1080\/10807030490513793","volume":"10","author":"J. Bohn","year":"2004","unstructured":"Bohn, J., Coroama, V., Langheinrich, M., Mattern, F., Rohs, M.: Living in a world of smart everyday objects: Social, economic, and ethical implications. Journal of Human and Ecological Risk Assessment\u00a010, 763\u2013786 (2004)","journal-title":"Journal of Human and Ecological Risk Assessment"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/s00779-004-0305-8","volume":"8","author":"M.S. Ackerman","year":"2004","unstructured":"Ackerman, M.S.: Privacy in pervasive environments: Next generation labelling protocols. Personal and Ubiquitous Computing\u00a08, 430\u2013439 (2004)","journal-title":"Personal and Ubiquitous Computing"},{"key":"10_CR6","unstructured":"\u00c5kesson, K.P., Humble, J., Crabtree, A., Bullock, A.: Usage and development scenarios for the tangible toolbox. ACCORD Deliverable D1.3, Swedish Institute of Computer Science (2001), http:\/\/www.sics.se\/accord\/plan\/del\/D1.3.pdf"},{"key":"10_CR7","unstructured":"Aschmoneit, P., H\u00f6big, M.: Context-aware collaborative environments for next generation business networks: Scenario document. COCONET Deliverable D 2.2, Telematica Institute (2002), http:\/\/coconet.telin.nl\/"},{"key":"10_CR8","volume-title":"Item level RFID: The business benefits of the \u201dtag everything\u201d scenario","author":"P. Harrop","year":"2005","unstructured":"Harrop, P.: Item level RFID: The business benefits of the \u201dtag everything\u201d scenario. IDTechEx Ltd., Cambridge (2005)"},{"key":"10_CR9","unstructured":"ITEA: ITEA technology roadmap for software-intensive systems, 2nd edn. Information Technology for European Advancement (ITEA) Office Association (2004), http:\/\/www.itea-office.org"},{"key":"10_CR10","unstructured":"L\u00f3pez\u00a0de Vallejo, I.L.: E-locus: A clustered view of European ICT for future workspaces. E-Locus Deliverable D5.5, Fundaci\u00f3n TEKNIKER (2004), http:\/\/e-locus.fundaciontekniker.com\/"},{"key":"10_CR11","unstructured":"Masera, M., Bloomfeld, R.: A dependability roadmap for the Information Society in Europe. AMSD Delilverable D1.1, Rand Europe (2003), https:\/\/rami.jrc.it\/roadmaps\/amsd\/"},{"key":"10_CR12","first-page":"281","volume-title":"Ambient Intelligence: The Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction","author":"F. Morganti","year":"2005","unstructured":"Morganti, F., Riva, G.: Ambient intelligence for rehabilitation. In: Riva, G., Vatalaro, F., Davide, F., Alcaiz, M. (eds.) Ambient Intelligence: The Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction, pp. 281\u2013292. IOS Press, Amsterdam (2005)"},{"key":"10_CR13","unstructured":"Palmas, G., Tsapatsoulis, N., Apolloni, B., Malchiodi, D., Delopoulos, A., Beverina, F.: Generic artefacts specification and acceptance criteria. Oresteia Deliverable D01, STMicroelectronics s.r.l. (2001), http:\/\/www.image.ece.ntua.gr\/oresteia\/"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1089\/109493103322011597","volume":"6","author":"G. Riva","year":"2003","unstructured":"Riva, G.: Ambient intelligence in health care. CyberPsychology and Behavior\u00a06, 295\u2013300 (2003)","journal-title":"CyberPsychology and Behavior"},{"key":"10_CR15","unstructured":"Savidis, A., Lalis, S., Karypidis, A., Georgalis, Y., Pachoulakis, Y., Gutknecht, J., Egger, B., Kramer, P., Tafra, M., Majoe, D., Lieu, V., Hunt, N., Gredmaier, L., Roberts, D.: Report on key reference scenarios. 2WEAR Deliverable\u00a0D1, Foundation for Research and Technology Hellas, Institute of Computer Science (2001), http:\/\/2wear.ics.forth.gr\/"},{"key":"10_CR16","volume-title":"Code and other laws of cyberspace","author":"L. Lessig","year":"2000","unstructured":"Lessig, L.: Code and other laws of cyberspace. Basic Books, New York (2000)"},{"key":"10_CR17","first-page":"101","volume":"79","author":"H. Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Washington Law Review\u00a079, 101\u2013139 (2004)","journal-title":"Washington Law Review"},{"key":"10_CR18","first-page":"1","volume":"5","author":"I.J. Singer","year":"2001","unstructured":"Singer, I.J.: Privacy and human nature. Ends and Means\u00a05, 1 (2001)","journal-title":"Ends and Means"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1016\/j.cag.2003.08.008","volume":"27","author":"F. Michahelles","year":"2003","unstructured":"Michahelles, F., Matter, P., Schmidt, A., Schiele, B.: Applying wearable sensors to avalanche rescue: First experiences with a novel avalanche beacon. Computers & Graphics\u00a027, 839\u2013847 (2003)","journal-title":"Computers & Graphics"},{"key":"10_CR20","unstructured":"Friedewald, M., Vildjiounaite, E., Wright, D., Maghiros, I., Verlinden, M., Alahuhta, P., Delaitre, S., Gutwirth, S., Schreurs, W., Punie, Y.: Safeguards in a world of ambient intelligence (SWAMI): The brave new world of ambient intelligence \u2013 A state-of-the-art review. Deliverable\u00a0D1 (2005), http:\/\/swami.jrc.es"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.tele.2004.11.001","volume":"22","author":"M. Friedewald","year":"2005","unstructured":"Friedewald, M., Da Costa, O., Punie, Y., Alahuhta, P., Heinonen, S.: Perspectives of ambient intelligence in the home environment. Telematics and Informatics\u00a022, 221\u2013238 (2005)","journal-title":"Telematics and Informatics"},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/MTAS.2005.1442375","volume":"24","author":"A.J. Elbirt","year":"2005","unstructured":"Elbirt, A.J.: Who are you? How to protect against identity theft. IEEE Technology and Society Magazine\u00a024, 5\u20138 (2005)","journal-title":"IEEE Technology and Society Magazine"},{"key":"10_CR23","volume-title":"Proceedings of Ubiconf 2004","author":"N. Winters","year":"2004","unstructured":"Winters, N.: Personal privacy and popular ubiquitous technology. In: Proceedings of Ubiconf 2004, April 19, 2004, Gresham College, London (2004)"},{"key":"10_CR24","first-page":"534","volume":"79","author":"K. Albrecht","year":"2002","unstructured":"Albrecht, K.: Supermarket cards: The tip of the retail surveillance iceberg. Denver University Law Review\u00a079, 534\u2013539 (2002)","journal-title":"Denver University Law Review"},{"key":"10_CR25","unstructured":"Farrell, N.: Sony gives rootkits for christmas. The Inquirer (December 26, 2005), http:\/\/www.theinquirer.net\/?article=28548"},{"key":"10_CR26","unstructured":"Borrus, A.: The privacy war of Richard Smith. Businessweek Online (February 14, 2000), http:\/\/www.businessweek.com\/2000\/00_07\/b3668067.htm?scriptFramed"},{"key":"10_CR27","unstructured":"Associated Press: Spy agency removes illegal tracking files. The New York Times (December 29, 2005), http:\/\/www.nytimes.com\/2005\/12\/29\/national\/29cookies.html"},{"key":"10_CR28","first-page":"77","volume-title":"Proceedings of the Third European Conference on Computer Supported Cooperative Work (ECSCW 1993)","author":"V. Bellotti","year":"1993","unstructured":"Bellotti, V., Sellen, A.: Design for privacy in ubiquitous computing environments. In: Proceedings of the Third European Conference on Computer Supported Cooperative Work (ECSCW 1993), pp. 77\u201392. Kluwer, Dordrecht (1993)"},{"key":"10_CR29","unstructured":"Nasoz, F., Alvarez, K., Lisetti, C., Finkelstein, N.: Emotion recognition from physiological signals for user modelling of affect. In: Proceedings of the 3rd Workshop on Affective and Attitude User Modelling, Pittsburgh, PA, USA, June 2003 (2003)"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Punie, Y., Delaitre, S., Maghiros, I., Wright, D., Friedewald, M., Alahuhta, P., Gutwirth, S., de\u00a0Hert, P., Lindner, R., Moscibroda, A., Schreurs, W., Verlinden, M., Vildjiounaite, E.: Safeguards in a world of ambient intelligence (SWAMI): Dark scenarios on ambient intelligence - Higlighting risks and vulnerabilities. SWAMI Deliverable\u00a02 (2005), http:\/\/swami.jrc.es","DOI":"10.1049\/cp:20060702"},{"issue":"6","key":"10_CR31","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1108\/14636690510628300","volume":"7","author":"D. Wright","year":"2005","unstructured":"Wright, D.: The dark side of ambient intelligence. Info - The journal of policy, regulation and strategy for telecommunications\u00a07(6), 33\u201351 (2005)","journal-title":"Info - The journal of policy, regulation and strategy for telecommunications"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734666_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T23:39:57Z","timestamp":1736293197000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734666_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333760","9783540333777"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/11734666_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}