{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T22:31:40Z","timestamp":1724538700658},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"ASU-DCU Catalyst Fund"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11948-018-0033-5","type":"journal-article","created":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T09:40:25Z","timestamp":1519897225000},"page":"737-769","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["The Ethics of Smart Stadia: A Stakeholder Analysis of the Croke Park Project"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-5290-8772","authenticated-orcid":false,"given":"Fiachra","family":"O\u2019Brolch\u00e1in","sequence":"first","affiliation":[]},{"given":"Simone","family":"de Colle","sequence":"additional","affiliation":[]},{"given":"Bert","family":"Gordijn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,1]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Ahmadi, A., Richter, C., O\u2019Connor, N., & Moran, K. (2015). Automatic detection, extraction and analysis of unrestrained gait using a wearable sensor system. Presented at the IEEE Engineering in Medicine and Biology Society, Milan.","DOI":"10.1109\/EMBC.2015.7318786"},{"key":"33_CR2","volume-title":"Uneasy access: Privacy for women in a free society","author":"A Allen","year":"1988","unstructured":"Allen, A. (1988). Uneasy access: Privacy for women in a free society. Totowa, NJ: Rowman and Littlefield."},{"key":"33_CR3","unstructured":"Allen, A. (2011). Privacy and medicine. In E. N. Zalta (Ed.), The Stanford Encyclopedia of Philosophy (Spring 2011). Retrieved from \n http:\/\/plato.stanford.edu\/archives\/spr2011\/entries\/privacy-medicine\/\n \n ."},{"issue":"3","key":"33_CR4","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/s10940-014-9236-3","volume":"31","author":"B Ariel","year":"2015","unstructured":"Ariel, B., Farrar, W. A., & Sutherland, A. (2015). The effect of police body-worn cameras on use of force and citizens\u2019 complaints against the police: A randomized controlled trial. Journal of Quantitative Criminology,\n 31(3), 509\u2013535. \n https:\/\/doi.org\/10.1007\/s10940-014-9236-3\n \n .","journal-title":"Journal of Quantitative Criminology"},{"key":"33_CR5","volume-title":"Nicomachean Ethics","author":"Aristotle","year":"1985","unstructured":"Aristotle, (349 BC\/1985 AD). Nicomachean Ethics. Indianapolis: Hackett Publishing Company."},{"issue":"2","key":"33_CR6","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s10551-006-9007-7","volume":"67","author":"L Ashworth","year":"2006","unstructured":"Ashworth, L., & Free, C. (2006). Marketing dataveillance and digital privacy: Using theories of justice to understand consumers\u2019 online privacy concerns. Journal of Business Ethics,\n 67(2), 107\u2013123. \n https:\/\/doi.org\/10.1007\/s10551-006-9007-7\n \n .","journal-title":"Journal of Business Ethics"},{"issue":"2","key":"33_CR7","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s10676-007-9135-5","volume":"9","author":"J Bailey","year":"2007","unstructured":"Bailey, J., & Kerr, I. R. (2007). Seizing control? The experience capture experiments of Ringley & Mann. Ethics and Information Technology,\n 9(2), 129\u2013139.","journal-title":"Ethics and Information Technology"},{"key":"33_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-016-9754-5","author":"G Baldini","year":"2016","unstructured":"Baldini, G., Botterman, M., Neisse, R., & Tallacchini, M. (2016). Ethical design in the Internet of Things. Science and Engineering Ethics. \n https:\/\/doi.org\/10.1007\/s11948-016-9754-5\n \n .","journal-title":"Science and Engineering Ethics"},{"key":"33_CR28","unstructured":"Baraniuk, C. (2017). Police to test app that assesses suspects. BBC News. Retrieved from \n http:\/\/www.bbc.com\/news\/technology-39857645\n \n ."},{"key":"33_CR9","unstructured":"BBC News. (2015). Paris attacks: What happened on the night. BBC News. Retrieved from \n http:\/\/www.bbc.com\/news\/world-europe-34818994\n \n ."},{"key":"33_CR10","unstructured":"BBC News. (2017). Manchester attack: What we know so far. BBC News. Retrieved from \n http:\/\/www.bbc.com\/news\/uk-england-manchester-40008389\n \n ."},{"key":"33_CR11","volume-title":"The panopticon writings","author":"J Bentham","year":"1995","unstructured":"Bentham, J. (1995). The panopticon writings. London: Verso."},{"issue":"1","key":"33_CR12","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MTS.2014.2301854","volume":"33","author":"D Bianchini","year":"2014","unstructured":"Bianchini, D., & Avila, I. (2014). Smart cities and their smart decisions: Ethical considerations. IEEE Technology and Society Magazine,\n 33(1), 34\u201340.","journal-title":"IEEE Technology and Society Magazine"},{"key":"33_CR13","unstructured":"Burrus, D. (2014). The Internet of Things is far bigger than anyone realizes. Retrieved June 15, 2015, from \n http:\/\/www.wired.com\/2014\/11\/the-internet-of-things-bigger\/\n \n ."},{"key":"33_CR14","unstructured":"Council of Europe. (1950). European Convention for the Protection of Human Rights and Fundamental Freedoms, as amended by Protocols Nos. 11 and 14. Council of Europe. Retrieved from \n http:\/\/www.echr.coe.int\/Documents\/Convention_ENG.pdf\n \n ."},{"issue":"01","key":"33_CR15","doi-asserted-by":"publisher","first-page":"1555001","DOI":"10.1142\/S0218001415550010","volume":"29","author":"T D\u2019Orazio","year":"2014","unstructured":"D\u2019Orazio, T., & Guaragnella, C. (2014). A survey of automatic event detection in multi-camera third generation surveillance systems. International Journal of Pattern Recognition and Artificial Intelligence,\n 29(01), 1555001. \n https:\/\/doi.org\/10.1142\/S0218001415550010\n \n .","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"33_CR16","unstructured":"DCU. (2014). Building smart cities technology in a smart stadium. Retrieved from \n https:\/\/www.dcu.ie\/news\/2014\/dec\/s1214o.shtml\n \n ."},{"key":"33_CR17","unstructured":"Deegan. (2013). Life is suite as Croke Park firm\u2019s profits double. Retrieved June 8, 2015, from \n http:\/\/www.independent.ie\/irish-news\/life-is-suite-as-croke-park-firms-profits-double-29775246.html\n \n ."},{"issue":"3","key":"33_CR210","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10551-006-9234-y","volume":"74","author":"N Dew","year":"2007","unstructured":"Dew, N., & Sarasvathy, S. D. (2007). Innovations, Stakeholders & Entrepreneurship. Journal of Business Ethics, 74(3), 267\u2013283. \n https:\/\/doi.org\/10.1007\/s10551-006-9234-y\n \n .","journal-title":"Journal of Business Ethics"},{"issue":"3","key":"33_CR18","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1068\/b32041t","volume":"34","author":"M Dodge","year":"2007","unstructured":"Dodge, M., & Kitchin, R. (2007). Outlines of a world coming into existence\u2019: Pervasive computing and the ethics of forgetting. Environment and Planning B: Planning and Design,\n 34(3), 431\u2013445.","journal-title":"Environment and Planning B: Planning and Design"},{"issue":"7","key":"33_CR19","doi-asserted-by":"publisher","first-page":"4893","DOI":"10.1007\/s11356-014-4026-x","volume":"22","author":"J Dong","year":"2015","unstructured":"Dong, J., Wang, G., Yan, H., Xu, J., & Zhang, X. (2015). A survey of smart water quality monitoring system. Environmental Science and Pollution Research,\n 22(7), 4893\u20134906. \n https:\/\/doi.org\/10.1007\/s11356-014-4026-x\n \n .","journal-title":"Environmental Science and Pollution Research"},{"key":"#cr-split#-33_CR20.1","unstructured":"European Commission. (2016). General Data Protection Regulation {Regulation"},{"key":"#cr-split#-33_CR20.2","unstructured":"(EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC}. Retrieved from http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2016:119:TOC ."},{"key":"33_CR21","unstructured":"Eyal, N. (2012). Informed consent. In E. N. Zalta (Ed.), The Stanford Encyclopedia of Philosophy (Fall 2012). Retrieved from \n http:\/\/plato.stanford.edu\/archives\/fall2012\/entries\/informed-consent\/\n \n ."},{"key":"33_CR22","unstructured":"Franssen, M., Lokhorst, G.-J., & van de Poel, I. (2015). Philosophy of technology. In E. N. Zalta (Ed.), The Stanford Encyclopedia of Philosophy (Fall 2015). Metaphysics Research Lab, Stanford University. Retrieved from \n https:\/\/plato.stanford.edu\/archives\/fall2015\/entriesechnology\/\n \n ."},{"key":"33_CR199","volume-title":"Strategic management: A stakeholder perspective","author":"RE Freeman","year":"1984","unstructured":"Freeman, R. E. (1984). Strategic management: A stakeholder perspective. Boston: Pitman."},{"key":"33_CR200","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815768","volume-title":"Stakeholder Theory: The state of the art","author":"RE Freeman","year":"2010","unstructured":"Freeman, R. E., Harrison, J. S., Wicks, A. C., Parmar, B. L., & de Colle, S. (2010). Stakeholder Theory: The state of the art. Cambridge: Cambridge University Press."},{"key":"33_CR23","unstructured":"GAA. (2016). GAA.ie. Retrieved January 22, 2016, from \n http:\/\/www.gaa.ie\/the-gaa\/about-the-gaa\/\n \n ."},{"key":"33_CR24","unstructured":"International Telecommunication Union. (2005). The Internet of Things. International Telecommunication Union. Retrieved from \n http:\/\/www.itu.int\/osg\/spu\/publications\/internetofthings\/\n \n ."},{"key":"33_CR25","doi-asserted-by":"crossref","unstructured":"Jargalsaikhan, I., Little, S., Trichet, R., & O\u2019Connor, N. (2015). Action recognition in video using a spatial-temporal graph-based feature representation. Presented at the 12th IEEE international conference on advanced video and signal based surveillance (AVSS2015), Karlsruhe, Germany. \n http:\/\/doi.ieeecomputersociety.org\/10.1109\/AVSS.2015.7301760\n \n .","DOI":"10.1109\/AVSS.2015.7301760"},{"issue":"4","key":"33_CR26","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s10551-014-2180-1","volume":"127","author":"D Johnson","year":"2015","unstructured":"Johnson, D. (2015). Technology with no human responsibility? Journal of Business Ethics,\n 127(4), 707\u2013715.","journal-title":"Journal of Business Ethics"},{"key":"33_CR27","first-page":"35","volume":"35","author":"R Kapela","year":"2015","unstructured":"Kapela, R., \u015awietlicka, A., Rybarczyk, A., Kolanowski, K., & O\u2019Connor, N. (2015). Real-time event classification in field sport videos. Signal Processing: Image Communication, 35, 35\u201345.","journal-title":"Signal Processing: Image Communication"},{"key":"33_CR29","unstructured":"Linaza, M. T., Moran, K., & O\u2019Connor, N. (2013). Traditional sports and games: A new opportunity for personalized access to cultural heritage. Presented at the 6th international workshop on personalized access to cultural heritage (PATCH 2013), Rome."},{"issue":"4","key":"33_CR30","first-page":"902","volume":"28","author":"CJH Ludwig","year":"2002","unstructured":"Ludwig, C. J. H., & Gilchrist, I. D. (2002). Stimulus-driven and goal-driven control over visual selection. Journal of Experimental Psychology: Human Perception and Performance,\n 28(4), 902\u2013912.","journal-title":"Journal of Experimental Psychology: Human Perception and Performance"},{"key":"33_CR31","volume-title":"After virtue: A study in moral theory (Third)","author":"A MacIntyre","year":"1981","unstructured":"MacIntyre, A. (1981). After virtue: A study in moral theory (Third). London: Bloomsbury."},{"key":"33_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-015-2565-9","author":"K Martin","year":"2015","unstructured":"Martin, K. (2015). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics. \n https:\/\/doi.org\/10.1007\/s10551-015-2565-9\n \n .","journal-title":"Journal of Business Ethics"},{"key":"33_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-017-9951-x","author":"ML Mart\u00edn-Ru\u00edz","year":"2017","unstructured":"Mart\u00edn-Ru\u00edz, M. L., Fern\u00e1ndez-Aller, C., Portillo, E., Malag\u00f3n, J., & del Barrio, C. (2017). Developing a system for processing health data of children using digitalized toys: Ethical and privacy concerns for the Internet of Things paradigm. Science and Engineering Ethics. \n https:\/\/doi.org\/10.1007\/s11948-017-9951-x\n \n .","journal-title":"Science and Engineering Ethics"},{"issue":"3","key":"33_CR34","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s10676-004-3422-1","volume":"6","author":"A Matthias","year":"2004","unstructured":"Matthias, A. (2004). The responsibility gap: Ascribing responsibility for the actions of learning automata. Ethics and Information Technology,\n 6(3), 175\u2013183. \n https:\/\/doi.org\/10.1007\/s10676-004-3422-1\n \n .","journal-title":"Ethics and Information Technology"},{"key":"33_CR35","volume-title":"On liberty","author":"JS Mill","year":"1859","unstructured":"Mill, J. S. (1859). On liberty. London: Penguin."},{"issue":"3","key":"33_CR36","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1023\/A:1006232417265","volume":"28","author":"S Miller","year":"2000","unstructured":"Miller, S., & Weckert, J. (2000). Privacy, the workplace and the internet. Journal of Business Ethics,\n 28(3), 255\u2013265. \n https:\/\/doi.org\/10.1023\/A:1006232417265\n \n .","journal-title":"Journal of Business Ethics"},{"issue":"3","key":"33_CR37","doi-asserted-by":"publisher","first-page":"697","DOI":"10.2307\/3857899","volume":"10","author":"AD Moore","year":"2000","unstructured":"Moore, A. D. (2000). Employee monitoring and computer technology: evaluative surveillance v. privacy. Business Ethics Quarterly,\n 10(3), 697\u2013709. \n https:\/\/doi.org\/10.2307\/3857899\n \n .","journal-title":"Business Ethics Quarterly"},{"issue":"3","key":"33_CR38","first-page":"215","volume":"40","author":"AD Moore","year":"2003","unstructured":"Moore, A. D. (2003). Privacy: Its meaning and value. American Philosophical Quarterly,\n 40(3), 215\u2013227.","journal-title":"American Philosophical Quarterly"},{"issue":"1","key":"33_CR39","first-page":"101","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review,\n 79(1), 101\u2013139.","journal-title":"Washington Law Review"},{"issue":"4","key":"33_CR40","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s10676-009-9208-8","volume":"11","author":"E Palm","year":"2009","unstructured":"Palm, E. (2009). Securing privacy at work: The importance of contextualized consent. Ethics and Information Technology,\n 11(4), 233\u2013241.","journal-title":"Ethics and Information Technology"},{"issue":"02","key":"33_CR41","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1142\/S1793351X17400062","volume":"11","author":"S Panchanathan","year":"2017","unstructured":"Panchanathan, S., Chakraborty, S., McDaniel, T., Tadayon, R., Fakhri, B., O\u2019Connor, N. E., et al. (2017). Enriching the fan experience in a smart stadium using Internet of Things technologies. International Journal of Semantic Computing,\n 11(02), 137\u2013170. \n https:\/\/doi.org\/10.1142\/S1793351X17400062\n \n .","journal-title":"International Journal of Semantic Computing"},{"issue":"4","key":"33_CR42","first-page":"269","volume":"12","author":"WA Parent","year":"1983","unstructured":"Parent, W. A. (1983). Privacy, morality, and the law. Philosophy & Public Affairs,\n 12(4), 269\u2013288.","journal-title":"Philosophy & Public Affairs"},{"issue":"3","key":"33_CR43","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1023\/A:1010057606781","volume":"2","author":"JW Patton","year":"2000","unstructured":"Patton, J. W. (2000). Protecting privacy in public? Surveillance technologies and the value of public places. Ethics and Information Technology,\n 2(3), 181\u2013187.","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"33_CR44","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1023\/A:1021600419449","volume":"42","author":"AJ Persson","year":"2003","unstructured":"Persson, A. J., & Hansson, S. O. (2003). Privacy at work\u2014Ethical criteria. Journal of Business Ethics,\n 42(1), 59\u201370.","journal-title":"Journal of Business Ethics"},{"key":"33_CR201","doi-asserted-by":"publisher","first-page":"51","DOI":"10.2307\/3857232","volume":"7","author":"R Phillips","year":"1997","unstructured":"Phillips, R. (1997). Stakeholder theory and a principle of fairness. Business Ethics Quarterly, 7, 51\u201366.","journal-title":"Business Ethics Quarterly"},{"issue":"01","key":"33_CR202","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5840\/beq20031312","volume":"13","author":"R Phillips","year":"2003","unstructured":"Phillips, R. (2003). Stakeholder Legitimacy. Business Ethics Quarterly, 13(01), 25\u201341. \n https:\/\/doi.org\/10.5840\/beq20031312\n \n .","journal-title":"Business Ethics Quarterly"},{"issue":"4","key":"33_CR203","doi-asserted-by":"publisher","first-page":"479","DOI":"10.5840\/beq200313434","volume":"13","author":"R Phillips","year":"2003","unstructured":"Phillips, R., Freeman, R. E., & Wicks, A. C. (2003). What Stakeholder Theory Is Not. Business Ethics Quarterly, 13(4), 479\u2013502.","journal-title":"Business Ethics Quarterly"},{"key":"33_CR45","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1002\/9781444310795.ch9","volume-title":"A companion to the philosophy of technology","author":"H Radder","year":"2009","unstructured":"Radder, H. (2009). Science and technology: Positivism and critique. In J. K. B. Olsen, S. A. Pedersen, & V. F. Hendricks (Eds.), A companion to the philosophy of technology (pp. 61\u201365). Hoboken, NJ: Wiley. \n https:\/\/doi.org\/10.1002\/9781444310795.ch9\n \n ."},{"issue":"10","key":"33_CR46","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks,\n 57(10), 2266\u20132279. \n https:\/\/doi.org\/10.1016\/j.comnet.2012.12.018\n \n .","journal-title":"Computer Networks"},{"key":"33_CR47","unstructured":"RTE. (2015). All-Ireland final was most watch programme in 2015 [Articles]. Retrieved 4 May 2016, from \n http:\/\/www.rte.ie\/sport\/gaa\/2015\/0922\/729512-all-ireland-final-was-most-watch-programme-in-2015\/\n \n ."},{"key":"33_CR48","unstructured":"Sandler, R. (2017). Environmental virtue ethics. In S. M. Gardiner & A. Thompson (Eds.), The Oxford handbook of environmental ethics (pp. 223\u2013233). Oxford: Oxford University Press. Retrieved from \n http:\/\/www.oxfordhandbooks.com\/view\/10.1093\/oxfordhb\/9780199941339.001.0001\/oxfordhb-9780199941339-e-20\n \n ."},{"key":"33_CR49","unstructured":"Solove, D. (2013). Privacy self-management and the consent dilemma. Harvard Law Review, 126. Retrieved from \n http:\/\/scholarship.law.gwu.edu\/cgi\/viewcontent.cgi?article=2093&context=faculty_publications\n \n ."},{"key":"33_CR50","volume-title":"(IN)VISIBLE: Learning to act in the metaverse","author":"S Sonvilla-Weiss","year":"2008","unstructured":"Sonvilla-Weiss, S. (2008). (IN)VISIBLE: Learning to act in the metaverse. Vienna: Springer."},{"key":"33_CR51","unstructured":"Sullins, J. (2014). Information technology and moral values. In E. N. Zalta (Ed.), The Stanford Encyclopedia of Philosophy (Spring 2014). Retrieved from \n http:\/\/plato.stanford.edu\/archives\/spr2014\/entries\/it-moral-values\/\n \n ."},{"key":"33_CR52","doi-asserted-by":"crossref","unstructured":"Tavani, H. T. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38. Retrieved from \n http:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/j.1467-9973.2006.00474.x\/full\n \n .","DOI":"10.1111\/j.1467-9973.2006.00474.x"},{"key":"33_CR53","unstructured":"The Economist. (2013). Don\u2019t even think about it. The Economist. Retrieved from \n https:\/\/www.economist.com\/news\/briefing\/21582042-it-getting-easier-foresee-wrongdoing-and-spot-likely-wrongdoers-dont-even-think-about-it\n \n ."},{"key":"33_CR54","unstructured":"The Universal Declaration of Human Rights. (1948). Retrieved September 20, 2015, from \n http:\/\/www.un.org\/en\/documents\/udhr\/index.shtml#a8\n \n ."},{"issue":"4","key":"33_CR55","doi-asserted-by":"publisher","first-page":"905","DOI":"10.2307\/1954312","volume":"74","author":"DF Thompson","year":"1980","unstructured":"Thompson, D. F. (1980). Moral responsibility of public officials: The problem of many hands. The American Political Science Review,\n 74(4), 905\u2013916. \n https:\/\/doi.org\/10.2307\/1954312\n \n .","journal-title":"The American Political Science Review"},{"key":"33_CR56","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1002\/9781444310795.ch39","volume-title":"A companion to the philosophy of technology","author":"E Vleuten van der","year":"2009","unstructured":"van der Vleuten, E. (2009). Large technical systems. In J. K. B. Olsen, S. A. Pedersen, & V. F. Hendricks (Eds.), A companion to the philosophy of technology (pp. 218\u2013223). Hoboken, NJ: Wiley."},{"issue":"1 & 2","key":"33_CR57","first-page":"167","volume":"7","author":"D Zhang","year":"2014","unstructured":"Zhang, D., Sullivan, T., Briciu Burghina, C. C., Murphy, K., McGuinness, K., O\u2019Connor, N. E., et al. (2014). Detection and classification of anomalous events in water quality datasets within a smart city-smart bay project. International Journal on Advances in Intelligent Systems,\n 7(1 & 2), 167\u2013178.","journal-title":"International Journal on Advances in Intelligent Systems"},{"issue":"1","key":"33_CR58","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s10551-014-2248-y","volume":"131","author":"W Zhou","year":"2015","unstructured":"Zhou, W., & Piramuthu, S. (2015). Information relevance model of customized privacy for IoT. Journal of Business Ethics,\n 131(1), 19\u201330.","journal-title":"Journal of Business Ethics"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-018-0033-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-018-0033-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-018-0033-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T16:03:02Z","timestamp":1567785782000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-018-0033-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,1]]},"references-count":65,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["33"],"URL":"https:\/\/doi.org\/10.1007\/s11948-018-0033-5","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,1]]},"assertion":[{"value":"24 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}