{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T17:04:51Z","timestamp":1732035891661},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,1,21]],"date-time":"2016-01-21T00:00:00Z","timestamp":1453334400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission (BE)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11948-016-9754-5","type":"journal-article","created":{"date-parts":[[2016,1,21]],"date-time":"2016-01-21T17:19:09Z","timestamp":1453396749000},"page":"905-925","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":104,"title":["Ethical Design in the Internet of Things"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-4830-1227","authenticated-orcid":false,"given":"Gianmarco","family":"Baldini","sequence":"first","affiliation":[]},{"given":"Maarten","family":"Botterman","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Neisse","sequence":"additional","affiliation":[]},{"given":"Mariachiara","family":"Tallacchini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,21]]},"reference":[{"issue":"1","key":"9754_CR1","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security and Privacy, 3(1), 26\u201333.","journal-title":"IEEE Security and Privacy"},{"key":"9754_CR2","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/1-4020-8090-5_14","volume":"12","author":"A Alessandro","year":"2004","unstructured":"Alessandro, A., (2004). Privacy and security of personal information. Economics of Information Security, 12, 179\u2013186.","journal-title":"Economics of Information Security"},{"issue":"1","key":"9754_CR4","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MSP.2010.38","volume":"8","author":"AI Anton","year":"2010","unstructured":"Anton, A. I., Earp, J. B., & Young, J. D. (2010). How internet users\u2019 privacy concerns have evolved since 2002. IEEE Security and Privacy, 8(1), 21\u201327.","journal-title":"IEEE Security and Privacy"},{"key":"9754_CR5","volume-title":"The human condition","author":"H Arendt","year":"1958","unstructured":"Arendt, H. (1958). The human condition. Chicago, IL: University of Chicago Press."},{"key":"9754_CR6","unstructured":"ARTICLE 29 DATA PROTECTION WORKING PARTY, Opinion 8\/2014 on the on Recent Developments on the Internet of Things. \n http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2014\/wp223_en.pdf\n \n , 16 September 2014. Accessed November 2, 2015."},{"issue":"4","key":"9754_CR7","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s10676-012-9293-y","volume":"14","author":"PAE Brey","year":"2012","unstructured":"Brey, P. A. E. (2012). Anticipating ethical issues in emerging IT. Ethics and Information Technology, 14(4), 305\u2013317.","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9754_CR8","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MTAS.2005.1407744","volume":"24","author":"J Cas","year":"2005","unstructured":"Cas, J. (2005). Privacy in pervasive computing environments\u2014A contradiction in terms? IEEE Technology and Society Magazine, 24(1), 24\u201333.","journal-title":"IEEE Technology and Society Magazine"},{"key":"9754_CR9","unstructured":"Cave, J. et al., (2011). Does it help or hinder? Promotion of innovation on the internet and citizens\u2019 right to privacy, final report, European Parliament, 2011. \n http:\/\/www.europarl.europa.eu\/committees\/fr\/studiesdownload.html?languageDocument=EN&file=65871\n \n . Accessed November 2, 2015."},{"issue":"3","key":"9754_CR10","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1007\/s11948-014-9551-y","volume":"20","author":"MD Cavelty","year":"2014","unstructured":"Cavelty, M. D. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), 701\u2013715.","journal-title":"Science and Engineering Ethics"},{"key":"9754_CR11","unstructured":"European Commission. (2012). Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), COM(2012) 11\/4 draft, 2012, Article 79(6)."},{"key":"9754_CR12","volume-title":"Opinion 28 of the European group on ethics in science and new technologies, Ethics of security and surveillance technologies","author":"European Group on Ethics in Science and New Technologies (EGE)","year":"2014","unstructured":"European Group on Ethics in Science and New Technologies (EGE). (2014). Opinion 28 of the European group on ethics in science and new technologies, Ethics of security and surveillance technologies. Luxembourg: Publications Office of the European Union."},{"key":"9754_CR13","unstructured":"Gottschalk-Mazouz, N. (2013). Internet and the flow of knowledge: Which ethical and political challenges will we face? From Ontos Verlag: Publications of the Austrian Ludwig Wittgenstein Society-New Series (Vols. 1\u201318), 7."},{"key":"9754_CR14","unstructured":"Guillemin, P., & Friess, P. (2009) Internet of things strategic research roadmap. Technical report, The Cluster of European Research Projects, September 2009. \n http:\/\/www.internet-of-things-research.eu\/pdf\/IoT\n \n Cluster Strategic Research Agenda 2009.pdf. Accessed November 2, 2015."},{"key":"9754_CR15","volume-title":"The internet of things in an enterprise context","author":"S Haller","year":"2009","unstructured":"Haller, S., Karnouskos, S., & Schroth, C. (2009). The internet of things in an enterprise context. Berlin Heidelberg: Springer."},{"issue":"9","key":"9754_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2015.05.002","volume":"53","author":"J Heurix","year":"2015","unstructured":"Heurix, J., Zimmermann, P., Neubauer, T., & Fenz, S. (2015). A taxonomy for privacy enhancing technologies. Computers & Security, 53(9), 1\u201317. doi:\n 10.1016\/j.cose.2015.05.002\n \n .","journal-title":"Computers & Security"},{"issue":"4","key":"9754_CR17","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MTS.2014.2364020","volume":"33","author":"I Kounelis","year":"2014","unstructured":"Kounelis, I., Baldini, G., Neisse, R., Steri, G., Tallacchini, M., & Guimaraes Pereira, A. (2014). Building trust in the human\u2013internet of things relationship. IEEE Technology and Society Magazine, 33(4), 73\u201380.","journal-title":"IEEE Technology and Society Magazine"},{"key":"9754_CR18","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1126\/science.1249382","volume":"343","author":"JE Lunshof","year":"2014","unstructured":"Lunshof, J. E., Church, G. M., & Prainsack, B. (2014). Raw personal data: Providing access. Science, 343, 373\u2013374.","journal-title":"Science"},{"key":"9754_CR19","doi-asserted-by":"crossref","unstructured":"Neisse, R., & Doerr, J. (2013). Model-based specification and refinement of usage control policies. In Proceedings of the eleventh international conference on privacy, security and trust (PST), Tarragona, Spain, July 2013.","DOI":"10.1109\/PST.2013.6596051"},{"key":"9754_CR20","doi-asserted-by":"crossref","unstructured":"Neisse, R., Fovino, I. N., Baldini, G., Stavroulaki, V., Vlacheas, P., & Giaffreda, R. (2014a). A model-based security toolkit for the internet of things. In International conference on availability, reliability and security (ARES 2014), pp 78\u201387.","DOI":"10.1109\/ARES.2014.17"},{"key":"9754_CR21","doi-asserted-by":"crossref","unstructured":"Neisse, R., Steri, G., & Baldini, G. Enforcement of Security Policy Rules for the Internet of Things. (2014b). 3rd International workshop on internet of things communications and technologies (IoT-CT), in conjunction with The 10th IEEE international conference on wireless and mobile computing, networking and communications (WiMob 2014).","DOI":"10.1109\/WiMOB.2014.6962166"},{"key":"9754_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.002","author":"R Neisse","year":"2015","unstructured":"Neisse, R., Steri, G., Fovino, I. N., & Baldini, G. (2015). SecKit: A model-based security toolkit for the internet of things. Elsevier Computers & Security Journal,. doi:\n 10.1016\/j.cose.2015.06.002\n \n .","journal-title":"Elsevier Computers & Security Journal"},{"key":"9754_CR23","unstructured":"Nissenbaum, H. (2015) Respecting context to protect privacy: Why meaning matters. Science and Engineering Ethics, 2015, 1\u201322. (online preview) \n http:\/\/link.springer.com\/article\/10.1007%2Fs11948-015-9674-9\n \n . Accessed November 2, 2015."},{"key":"9754_CR24","volume-title":"Governance of ICT security: a perspective from the JRC. Technical Report","author":"\u00c2G Pereira","year":"2014","unstructured":"Pereira, \u00c2. G., & Tallacchini, M. (2014). Governance of ICT security: a perspective from the JRC. Technical Report. Luxembourg: Publications Office of the European Union."},{"key":"9754_CR25","unstructured":"Rissanen, E. (2010). Extensible access control markup language v3.0, 2010. \n http:\/\/docs.oasis-open.org\n \n . Accessed November 2, 2015."},{"key":"9754_CR26","unstructured":"Schmidt, E. (2010). \u2018How Google Works\u2019 Is all about the customer experience, Published on October 10, 2014 by Cory McNutt."},{"issue":"1","key":"9754_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11948-013-9510-z","volume":"21","author":"K Shilton","year":"2015","unstructured":"Shilton, K. (2015). Anticipatory ethics for a future Internet: Analyzing values during the design of an internet infrastructure. Science and Engineering Ethics, 21(1), 1\u201318.","journal-title":"Science and Engineering Ethics"},{"key":"9754_CR28","doi-asserted-by":"publisher","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76(1), 146\u2013164, ISSN 1389-1286. doi:\n 10.1016\/j.comnet.2014.11.008\n \n . Accessed November 2, 2015.","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"9754_CR29","doi-asserted-by":"crossref","unstructured":"Trappeniers, L., Roelands, M., Godon, M., Criel, J., & Dobbelaere, P. (2009) Towards abundant DiY service creativity. In 13th International conference on ICIN 2009 in intelligence in next generation networks, October 26\u201329, 2009, pp. 1\u20136.","DOI":"10.1109\/ICIN.2009.5357076"},{"issue":"4","key":"9754_CR30","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/j.clsr.2013.05.010","volume":"29","author":"RH Weber","year":"2013","unstructured":"Weber, R. H. (2013). Internet of things\u2013Governance quo vadis? Computer Law & Security Review, 29(4), 341\u2013347.","journal-title":"Computer Law & Security Review"},{"issue":"2","key":"9754_CR31","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.clsr.2015.01.003","volume":"31","author":"RH Weber","year":"2015","unstructured":"Weber, R. H. (2015). The digital future\u2014A challenge for privacy? Computer Law & Security Review, 31(2), 234\u2013242. doi:\n 10.1016\/j.clsr.2015.01.003\n \n .","journal-title":"Computer Law & Security Review"},{"key":"9754_CR32","doi-asserted-by":"publisher","unstructured":"Weinberg, B. D., Milne, G. R., Andonova, Y. G., & Hajjat, F. M. (2015). Internet of things: Convenience vs. privacy and secrecy, Business Horizons, Available online August 9, 2015, ISSN 0007-6813, doi: \n 10.1016\/j.bushor.2015.06.005\n \n .","DOI":"10.1016\/j.bushor.2015.06.005"},{"key":"9754_CR33","unstructured":"White House. (2012). Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy. \n http:\/\/www.whitehouse.gov\/sites\/default\/files\/privacy-final.pdf\n \n . Accessed November 2, 2015."}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-016-9754-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-016-9754-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-016-9754-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-016-9754-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T19:07:52Z","timestamp":1553627272000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-016-9754-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,21]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["9754"],"URL":"https:\/\/doi.org\/10.1007\/s11948-016-9754-5","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,21]]}}}