{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T23:44:25Z","timestamp":1722728665419},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2008,10,7]],"date-time":"2008-10-07T00:00:00Z","timestamp":1223337600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1007\/s00779-008-0211-6","type":"journal-article","created":{"date-parts":[[2008,10,6]],"date-time":"2008-10-06T08:34:37Z","timestamp":1223282077000},"page":"435-444","source":"Crossref","is-referenced-by-count":29,"title":["Legal safeguards for privacy and data protection in ambient intelligence"],"prefix":"10.1007","volume":"13","author":[{"given":"Paul","family":"De Hert","sequence":"first","affiliation":[]},{"given":"Serge","family":"Gutwirth","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Moscibroda","sequence":"additional","affiliation":[]},{"given":"David","family":"Wright","sequence":"additional","affiliation":[]},{"given":"Gloria","family":"Gonz\u00e1lez Fuster","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,10,7]]},"reference":[{"key":"211_CR1","unstructured":"Article 29 Data Protection Working Party (2007) Opinion 4\/2007 on the concept of personal data. (01248\/07\/EN WP 136) http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/docs\/wpdocs\/2007\/wp136_en.pdf"},{"key":"211_CR2","unstructured":"Article 29 Data Protection Working Party (2005) Working document on data protection issues related to RFID technology. (10107\/05\/EN WP 105). http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/docs\/wpdocs\/2005\/wp105_en.pdf , last accessed 02.07.2007"},{"key":"211_CR3","unstructured":"Article 29 Data Protection Working Party (2004) Opinion on more harmonised information provisions. (11987\/04\/EN-WP 100). http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/"},{"key":"211_CR4","unstructured":"Bauer M, Meints M, Hansen M (eds) (2005) Structured overview on prototypes and concepts of identity management systems, Future of Identity in the Information Society (FIDIS) Deliverable D3.1. http:\/\/www.fidis.net"},{"key":"211_CR5","unstructured":"Beslay L, Hakala H (2003) Digital territory: bubbles. (draft version available at http:\/\/cybersecurity.jrc.es\/docs\/DigitalTerritoryBubbles.pdf ), last accessed on 02.07.2007"},{"key":"211_CR6","unstructured":"Beslay L, Punie Y (2003) The virtual residence: identity, privacy and security. In: Security and privacy for the citizen in the post-september 11 digital age: a prospective overview, IPTS report to the European Parliament Committee on Citizens\u2019 Freedoms and Rights, Justice and Home Affairs (LIBE). http:\/\/ftp.jrc.es\/eur20823en.pdf , last accessed 02.07.2007"},{"key":"211_CR7","unstructured":"Bryce C, Dekker M, Etalle S, Le Metayer D, Le Mouel MF, Minier M, Moret-Bailly J, Ubeda S (2007) Ubiquitous privacy protection: position paper. In: Bajart A, Muller H, Strang T (eds) UbiComp 2007 Workshops Proceedings, Innsbruck, Austria September 2007, pp 397\u2013402"},{"key":"211_CR9","unstructured":"Centre for democracy and technology (CDT) Working Group on RFID (2006) Privacy best practices for deployment of RFID technology, interim draft. http:\/\/www.cdt.org\/privacy\/20060501rfid-best-practices.php , last accessed 02.07.2007"},{"key":"211_CR10","unstructured":"Casassa Mont M, Pearson S, Bramhall P (2003) Towards accountable management of identity and privacy: sticky policies and enforcable tracing services, HP labs technical reports, HPL\u20132003-49, Bristol 2003. http:\/\/www.hpl.hp.com\/techreports\/2003\/HPL-2003-49.pdf"},{"key":"211_CR11","unstructured":"Daskala B, Maghiros I (2007) Digital territories: towards the protection of public and private spaces in a digital and ambient intelligence environment. EUR 22765 EN http:\/\/www.jrc.es\/publications\/pub.cfm?id=1474"},{"key":"211_CR12","unstructured":"De Hert P (2006) What are the risks and what guarantees need to be put in place in view of interoperability of police databases? Standard Briefing Note \u2018JHA & Data Protection\u2019, No. 1, produced on behalf of the European Parliament"},{"key":"211_CR13","unstructured":"De Hert P, Gutwirth S (2003) Making sense of privacy and data protection: a prospective overview in the light of the future of identity, location-based services and virtual residence. In: Security and privacy for the citizen in the post-September 11 digital age: a prospective overview, IPTS Report to the European Parliament Committee on Citizens\u2019 Freedoms and Rights, Justice and Home Affairs (LIBE). http:\/\/ftp.jrc.es\/eur20823en.pdf , last acccessed 02.07.2007"},{"key":"211_CR14","volume-title":"Privacy and the criminal law","author":"P Hert De","year":"2005","unstructured":"De Hert P, Gutwirth S (2005) Privacy, data protection and law enforcement. Opacity of the individual and transparency of power. In: Claes E, Duff A, Gutwirth S (eds) Privacy and the criminal law. Oxford, Antwerp"},{"key":"211_CR15","unstructured":"EPCglobal Ltd. (2007) Guidelines regarding privacy in RFID technology. http:\/\/www.epcglobal.org\/public_policy\/public_policy_guidelines.html , last accessed 02.07.2007"},{"key":"211_CR16","unstructured":"Faull J (2007) Heard by the House of Lords, minutes of evidence taken before the Select Committee of the European Union (Sub-Committee F), The EU-US PRN Agreement, 22 March 2007, p 5. http:\/\/www.publications.parliament.uk\/pa\/ld\/lduncorr\/euf220307_2.pdf , last consulted 02.07.2007"},{"key":"211_CR17","unstructured":"Gutwirth S (2002) Privacy and the information age, Lanham\/Boulder\/New York\/Oxford, Rowman & Littlefield Publ. 158 p"},{"key":"211_CR18","doi-asserted-by":"crossref","unstructured":"Gutwirth S, De Hert P (2008) Regulating profiling in a democratic constitutional state In: Hildebrandt M, Gutwirth S (eds) Profiling the European citizen. Cross disciplinary perspectives, Springer Press, Dordrecht, pp 271\u2013291","DOI":"10.1007\/978-1-4020-6914-7_14"},{"key":"211_CR19","unstructured":"Han J, Shah A, Luk M, Perrig A (2007) Don\u2019t sweat your privacy, using humidity to detect human presence. In: Bajart A, Muller H, Strang S (eds) UbiComp 2007 Workshops Proceedings, Innsbruck, Austria, pp 422\u2013427"},{"key":"211_CR20","unstructured":"Hansen M, Krasemann H (eds) (2005) Privacy and identity management for europe, PRIME White Paper. Deliverable 15.1"},{"key":"211_CR21","unstructured":"Hildebrandt M (2006) \u201cProfiles and correlatable humans\u201d. In: Stehr N (ed) Who owns knowledge? Transaction Books, New Brunswick"},{"key":"211_CR22","unstructured":"Hildebrandt M, Backhouse J (eds) (2005) Descriptive analysis and inventory of profiling practices, FIDIS (Future of Identity in the Information Society) Deliverable D7.2, http:\/\/www.fidis.net"},{"key":"211_CR23","unstructured":"Hildebrandt M, Koops BJ (eds) A vision of ambient law, FIDIS (Future of Identity in the Information Society) D7.9, version as of 15.11.2007 ( http:\/\/www.fidis.net )"},{"key":"211_CR24","unstructured":"Hildebrandt M, Meints M (eds) (2006) RFID, profiling, and AmI, FIDIS (Future of Identity in the Information Society) Deliverable D7.7. http:\/\/www.fidis.net"},{"key":"211_CR25","unstructured":"Kardasiadou Z, Talidou Z (2006) Report on legal issues of RFID Technology, LEGAL IST (Legal Issues for the Advancement of Information Society Technologies). Deliverable 15"},{"key":"211_CR26","unstructured":"Lahlou S (2005) Living in a goldfish bowl: lessons learned about privacy issues in a privacy-challenged environment, Workshop on UbiComp Privacy, privacy in context"},{"issue":"3","key":"211_CR27","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1145\/1047671.1047705","volume":"40","author":"S Lahlou","year":"2005","unstructured":"Lahlou S, Langheinrich M, Rocker C (2005) Privacy and trust issues with invisible computers. Commun ACM 40(3):59\u201360","journal-title":"Commun ACM"},{"key":"211_CR28","unstructured":"Leenes R, Schallabock J, Hansen M (2007) Prime white paper v2., 2007. https:\/\/www.prime-project.eu\/prime_products\/whitepaper\/ , last accessed 02.07.2007"},{"key":"211_CR30","unstructured":"Meints M (2006) AmI: the European perspective on data protection legislation and privacy policies, presentation at the SWAMI International Conference on Safeguards in a World of Ambient Intelligence, 21"},{"key":"211_CR31","unstructured":"M\u00fcller G, Wohlgemuth S (eds) (2005) Study on mobile identity management, FIDIS (Future of Identity in the Information Society) Deliverable D3.3. http:\/\/www.fidis.net"},{"key":"211_CR32","unstructured":"Rouvroy A (2007) Privacy, data protection, and the unprecedented challenges of ambient intelligence, 11 September, available at SSRN: http:\/\/ssrn.com\/abstract=1013984"},{"key":"211_CR33","unstructured":"Schreurs W, Hildebrandt M, Gasson M, Warwick K (eds) (2005) Report on actual and possible profiling techniques in the field of ambient intelligence, FIDIS (Future of Identity in the Information Society) Deliverable D7.3. http:\/\/www.fidis.net"},{"key":"211_CR34","unstructured":"Wright D, Gutwirth S, Friedewald M, Punie Y, Vildjiounaite E (eds) (2008) Safeguards in a world of ambient intelligence, Springer Press, Dordrecht, p 291"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-008-0211-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-008-0211-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-008-0211-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T06:28:52Z","timestamp":1559111332000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-008-0211-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,7]]},"references-count":32,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2009,8]]}},"alternative-id":["211"],"URL":"https:\/\/doi.org\/10.1007\/s00779-008-0211-6","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,10,7]]}}}