{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T09:27:18Z","timestamp":1726133238224},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030831639"},{"type":"electronic","value":"9783030831646"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-83164-6_13","type":"book-chapter","created":{"date-parts":[[2021,8,15]],"date-time":"2021-08-15T23:03:01Z","timestamp":1629068581000},"page":"163-174","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Game of Fog and Mirrors: Privacy in the World of Internet of Things"],"prefix":"10.1007","author":[{"given":"Alice F.","family":"Parker","sequence":"first","affiliation":[]},{"given":"Tor-Morten","family":"Gr\u00f8nli","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Younas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,16]]},"reference":[{"key":"13_CR1","unstructured":"Sharma, C.: Iot data privacy framework. http:\/\/www.chetansharma.com\/publications\/iot-data-privacy-framework\/. Accessed 9 Feb 2021"},{"key":"13_CR2","doi-asserted-by":"publisher","unstructured":"Weiser, M.: Ubiquitous computing. Computer 26(10), 71\u201372 (1993) https:\/\/doi.org\/10.1109\/2.237456","DOI":"10.1109\/2.237456"},{"key":"13_CR3","unstructured":"Carv, C.: https:\/\/getcarv.com\/. Accessed 2 July 2021"},{"key":"13_CR4","unstructured":"Oxford University Press: privacy, n. https:\/\/www.oed.com\/view\/Entry\/151596?redirectedFrom=privacy. Accessed 11 Feb 2021"},{"key":"13_CR5","unstructured":"European Union: Gdpr data privacy. https:\/\/gdpr.eu\/data-privacy\/. Accessed 11 Feb 2021"},{"key":"13_CR6","volume-title":"The Panopticon Writings","author":"J Bentham","year":"1995","unstructured":"Bentham, J., Bozovic, M.: The Panopticon Writings. Verso, New York (1995)"},{"issue":"6","key":"13_CR7","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/MSP.2017.4251118","volume":"15","author":"R Chow","year":"2017","unstructured":"Chow, R.: The last mile for IoT privacy. IEEE Sec. Priv. 15(6), 73\u201376 (2017)","journal-title":"IEEE Sec. Priv."},{"key":"13_CR8","volume-title":"Discipline and Punish: The Birth of the Prison","author":"M Foucault","year":"1977","unstructured":"Foucault, M.: Discipline and Punish: The Birth of the Prison. Pantheon Books, New York (1977)"},{"key":"13_CR9","unstructured":"Privacy International. Timeline IoT in court: https:\/\/privacyinternational.org\/timelineiotincourt. Accessed 12 Feb 2021"},{"key":"13_CR10","unstructured":"Orwell, G.: Centennial ed. Tandem Library, 1950 (1984)"},{"issue":"6","key":"13_CR11","first-page":"1","volume":"8","author":"A Alwarafy","year":"2020","unstructured":"Alwarafy, A., Al-Thelaya, K.A., Abdallah, M., Schneider, J., Hamdi, M.: A survey on security and privacy issues in edge computing-assisted internet of things. IEEE Internet Things J. 8(6), 1 (2020)","journal-title":"IEEE Internet Things J."},{"key":"13_CR12","first-page":"1","volume":"2018","author":"LM Tanczer","year":"2018","unstructured":"Tanczer, L.M., Steenmans, I., Elsden, M., Blackstock, J., Carr, M.: Emerging risks in the IoT ecosystem: who\u2019s afraid of the big bad smart fridge? Living Internet Things: Cybersec. IoT 2018, 1\u20139 (2018)","journal-title":"Living Internet Things: Cybersec. IoT"},{"issue":"4","key":"13_CR13","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCC.2015.85","volume":"2","author":"C Macropoulos","year":"2015","unstructured":"Macropoulos, C., Martin, K.M.: Balancing privacy and surveillance in the cloud. IEEE Cloud Comput. 2(4), 14\u201321 (2015)","journal-title":"IEEE Cloud Comput."},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Kounoudes, A.D., Kapitsaki, G.M.: A mapping of IoT user-centric privacy preserving approaches to the GDPR. Internet Things 11, 100179 (2020)","DOI":"10.1016\/j.iot.2020.100179"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Thorburn, R., Margheri, A., Paci, F.: Towards an integrated privacy protection framework for IoT: contextualising regulatory requirements with industry best practices. In: Living in the Internet of Things (IoT 2019), pp. 1\u20136 (2019)","DOI":"10.1049\/cp.2019.0170"},{"key":"13_CR16","doi-asserted-by":"publisher","unstructured":"Davies, N., Taft, N., Satyanarayanan, M., Clinch, S., Amos, B.: Privacy mediators: helping IoT cross the chasm. In: Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, Series HotMobile 2016. Association for Computing Machinery, New York, pp. 39\u201344 (2016). https:\/\/doi.org\/10.1145\/2873587.2873600","DOI":"10.1145\/2873587.2873600"},{"issue":"9","key":"13_CR17","doi-asserted-by":"publisher","first-page":"50","DOI":"10.23919\/JCC.2020.09.005","volume":"17","author":"M Bi","year":"2020","unstructured":"Bi, M., Wang, Y., Cai, Z., Tong, X.: A privacy-preserving mechanism based on local differential privacy in edge computing. China Commun. 17(9), 50\u201365 (2020)","journal-title":"China Commun."},{"key":"13_CR18","unstructured":"Brendan, M., Daniel, R.: Federated learning. https:\/\/ai.googleblog.com\/2017\/04\/federated-learning-collaborative.html. Accessed 9 Feb 2021"},{"key":"13_CR19","unstructured":"Jane, W.: BBC|Amazon faces spying claims over AI cameras in vans. https:\/\/www.bbc.com\/news\/technology-55938494. Accessed 4 Feb 2021"},{"key":"13_CR20","doi-asserted-by":"publisher","unstructured":"Parkin, S., Patel, T., Lopez-Neira, I., Tanczer, L.: Usability analysis of shared device ecosystem security: informing support for survivors of IoT-facilitated tech-abuse. In: Proceedings of the New Security Paradigms Workshop, Series NSPW 2019. Association for Computing Machinery, New York, pp. 1\u201315 (2019). https:\/\/doi.org\/10.1145\/3368860.3368861","DOI":"10.1145\/3368860.3368861"}],"container-title":["Lecture Notes in Computer Science","Mobile Web and Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-83164-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T11:50:45Z","timestamp":1673092245000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-83164-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030831639","9783030831646"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-83164-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"16 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiWIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Web and Intelligent Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobiwis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mobiwis.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}