{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T23:35:50Z","timestamp":1726097750380},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,2,2]],"date-time":"2017-02-02T00:00:00Z","timestamp":1485993600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s11948-017-9872-8","type":"journal-article","created":{"date-parts":[[2017,2,2]],"date-time":"2017-02-02T05:04:16Z","timestamp":1486011856000},"page":"1-28","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":96,"title":["Ethical Implications of User Perceptions of Wearable Devices"],"prefix":"10.1007","volume":"24","author":[{"given":"L. H.","family":"Segura Anaya","sequence":"first","affiliation":[]},{"given":"Abeer","family":"Alsadoon","sequence":"additional","affiliation":[]},{"given":"N.","family":"Costadopoulos","sequence":"additional","affiliation":[]},{"given":"P. W. C.","family":"Prasad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,2]]},"reference":[{"key":"9872_CR1","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/s11948-011-9348-1","volume":"19","author":"H Bjorn","year":"2013","unstructured":"Bjorn, H. (2013). Ethical challenges with welfare technology: A review of the literature. Science and Engineering Ethics, 19, 389\u2013406.","journal-title":"Science and Engineering Ethics"},{"key":"9872_CR2","unstructured":"Camaraa, C. L. (2015). Security and privacy issues in implanfigure wearable device: A comprehensive survey. Journal of Biomedical Informatics, 271\u2013289."},{"key":"9872_CR3","doi-asserted-by":"crossref","first-page":"41","DOI":"10.3109\/17483107.2013.867372","volume":"9","author":"C Carmichael","year":"2014","unstructured":"Carmichael, C. (2014). BNCI systems as a potential assistive technology: Ethical issues and participatory research in the BrainAble project. Disability and Rehabilitation: Assistive Technology, 9, 41\u201347.","journal-title":"Disability and Rehabilitation: Assistive Technology"},{"key":"9872_CR4","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.artmed.2012.09.003","volume":"56","author":"M Chana","year":"2012","unstructured":"Chana, M. (2012). Current status and future challenges. Artificial Intelligence in Medicine, 56, 137\u2013156.","journal-title":"Artificial Intelligence in Medicine"},{"key":"9872_CR5","unstructured":"Colclasure, S. (2014). Bid data requires a renewal of policies. Privacy Journal, 2\u20135."},{"key":"9872_CR7","unstructured":"Itani, W., Kayssi, A. (2012). Security and privacy in body sensor networks: Challenges, solutions and research directions. In E-Healthcare Systems and Wireless Communications: Current and Future Challenges (pp. 100\u2013127). Information Science References."},{"key":"9872_CR8","first-page":"379","volume":"20","author":"T Jacquemard","year":"2014","unstructured":"Jacquemard, T. (2014). Challenges and opportunities of lifelof tecnologies: A literature review and critical analysis. Science and Engineering, 20, 379\u2013409.","journal-title":"Science and Engineering"},{"key":"9872_CR9","doi-asserted-by":"crossref","first-page":"1197","DOI":"10.1007\/s00779-015-0842-3","volume":"19","author":"E Kanjo","year":"2015","unstructured":"Kanjo, E., & Al-Husain, L. (2015). Emotions in context: Examining pervasive affective sensing systems, applications, and analyses. Personal and Ubiquitous Computing, 19, 1197\u20131212.","journal-title":"Personal and Ubiquitous Computing"},{"key":"9872_CR10","unstructured":"Kapadial, A. (2014). Virtual walls: Protecting digital privacy in pervasive enviroments. Computer Science Journal, 234\u2013256."},{"key":"9872_CR11","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1093\/ijlit\/eav003","volume":"23","author":"A Kotsios","year":"2015","unstructured":"Kotsios, A. (2015). Privacy in an augmented reality. International Journal of Law and Information Technology, 23, 157\u2013185.","journal-title":"International Journal of Law and Information Technology"},{"key":"9872_CR12","first-page":"379","volume":"20","author":"P Novitzky","year":"2014","unstructured":"Novitzky, P. (2014). Challenges and opportunities of lifelog technologies: A literature review and critical analysis. Science and Engineering, 20, 379\u2013409.","journal-title":"Science and Engineering"},{"key":"9872_CR13","first-page":"1","volume":"4","author":"T Page","year":"2015","unstructured":"Page, T. (2015a). Privacy issues surrounding wearable technology. I-Manager\u2019s Journal on Information Technology, 4, 1\u201316.","journal-title":"I-Manager\u2019s Journal on Information Technology"},{"key":"9872_CR14","doi-asserted-by":"crossref","first-page":"12","DOI":"10.4018\/IJTD.2015040102","volume":"6","author":"T Page","year":"2015","unstructured":"Page, T. (2015b). A Forecast of the Adoption of Wearable technology. International Journal of Technology Diffusion, 6, 12\u201329.","journal-title":"International Journal of Technology Diffusion"},{"key":"9872_CR15","first-page":"9","volume":"9","author":"S Safavi","year":"2014","unstructured":"Safavi, S. (2014). Conecptual privacy framework for health information on wearable devices. Plus One, 9, 9\u201312.","journal-title":"Plus One"},{"key":"9872_CR16","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3928\/19404921-20090101-10","volume":"2","author":"HR Spring","year":"2009","unstructured":"Spring, H. R. (2009). Improving caregivers\u2019 well-being by using technology to manage nighttime activity in persons with dementia. Research in Gerontological Nursing, 2, 39\u201348.","journal-title":"Research in Gerontological Nursing"},{"key":"9872_CR17","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MTS.2014.2319978","volume":"33","author":"S Wagemakers","year":"2014","unstructured":"Wagemakers, S., & Van Zoonen, L. (2014). Giving meaning to RFID and cochlear implants. IEEE Technology and Society Magazine, 33, 73\u201380.","journal-title":"IEEE Technology and Society Magazine"},{"key":"9872_CR18","unstructured":"Williams, L. (2010). Wireless mobile medical devices. In Electrical and Computer Engineering Design Handbook (pp. 1\u201320)."},{"key":"9872_CR19","first-page":"56","volume":"4","author":"F Wu","year":"2013","unstructured":"Wu, F. (2013). Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. Journal of Medical Systems, 4, 56\u201367.","journal-title":"Journal of Medical Systems"},{"key":"9872_CR20","first-page":"281","volume":"24","author":"A-S Yeslam","year":"2015","unstructured":"Yeslam, A.-S. (2015). The use of data mining by private health insurance copmanies and customer\u2019s privacy. Bioethics and Information technology, 24, 281\u2013292.","journal-title":"Bioethics and Information technology"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-017-9872-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9872-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9872-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T10:05:46Z","timestamp":1517825146000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-017-9872-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,2]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["9872"],"URL":"https:\/\/doi.org\/10.1007\/s11948-017-9872-8","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,2]]}}}