{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,2]],"date-time":"2024-06-02T17:10:28Z","timestamp":1717348228138},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Technol. Soc. Mag."],"published-print":{"date-parts":[[2014]]},"DOI":"10.1109\/mts.2014.2345203","type":"journal-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T18:58:41Z","timestamp":1410980321000},"page":"62-70","source":"Crossref","is-referenced-by-count":1,"title":["Participatory Sensing, Privacy, and Trust Management for Interactive Local Government"],"prefix":"10.1109","volume":"33","author":[{"given":"Slaven","family":"Marusic","sequence":"first","affiliation":[]},{"given":"Jayavardhana","family":"Gubbi","sequence":"additional","affiliation":[]},{"given":"Helen","family":"Sullivan","sequence":"additional","affiliation":[]},{"given":"Yee Wei","family":"Lawand","sequence":"additional","affiliation":[]},{"given":"M.","family":"Palaniswami","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Real noise from the urban environment: How ambient community noise affects health and what can be done about it","volume":"37","author":"vernez moudon","year":"2009","journal-title":"Am J Prev Med"},{"key":"ref38","year":"2013","journal-title":"Mobile Privacy A better practice guide for mobile app developers"},{"key":"ref33","first-page":"410","article-title":"The pursuit of privacy in a world where information control is failing","volume":"36","author":"thierer","year":"2013","journal-title":"Harvard J Law & Public Policy"},{"key":"ref32","first-page":"17","article-title":"Where has all our privacy gone?","volume":"18","author":"bast","year":"2013","journal-title":"J Legal Studies in Business"},{"key":"ref31","year":"2012","journal-title":"Data breach notification A guide to handling personal information security breaches"},{"key":"ref30","year":"2012","journal-title":"Anonymisation Managing Data Protection Risk Code of Practice"},{"key":"ref37","year":"2012","journal-title":"Privacy design guidelines for mobile application development"},{"key":"ref36","year":"2008","journal-title":"Privacy by Design"},{"key":"ref35","year":"2013","journal-title":"Accountability Framework for the implementation of the GSMA Privacy Design Guidelines for Mobile App Development"},{"key":"ref34","year":"2013","journal-title":"Mobile apps—Emerging issues in media and communications"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0305-750X(96)00023-X"},{"key":"ref40","article-title":"2Loud","year":"2013","journal-title":"School of Architecture and Built Environment and School of Information & Business Analytics"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2008.11.004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01721-6_4"},{"key":"ref13","article-title":"Participatory privacy in urban sensing","author":"shilton","year":"0","journal-title":"Proc Int'l Workshop Mobile Device and Urban Sensing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1858171.1858175"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6423189"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MPRV.2007.83","article-title":"Privacy in location-aware computing environments","volume":"6","author":"anderson","year":"2007","journal-title":"Pervasive Computing"},{"key":"ref17","first-page":"97","article-title":"Intelligent Transportation systems: Personal data needs and privacy law","volume":"39","author":"garry","year":"2012","journal-title":"Transportation Law J"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.073"},{"key":"ref19","article-title":"ART Sense: Anonymous reputation and trust in participatory sensing","author":"wang","year":"0","journal-title":"Proc IEEE InfoCom"},{"key":"ref28","author":"monaghan","year":"2013","journal-title":"Data leaks in local government where are the cracks in your system?"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791226"},{"key":"ref27","article-title":"Information privacy and data control in cloud computing: Consumers, privacy preferences, and market efficiency","volume":"341","author":"kesan","year":"2013","journal-title":"Washington & Lee Law Rev"},{"key":"ref3","author":"evans","year":"2013","journal-title":"Public participation in an era of governance Lessons from Europe for Australia local government"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref29","article-title":"Ethical issues in participatory sensing","author":"shilton","year":"2012","journal-title":"CORE Issues in Professional and Research Ethics"},{"key":"ref5","article-title":"Citizen noise pollution monitoring","author":"maisonneuve","year":"0","journal-title":"Proc 10th Annu Int Conf Digit Government Res"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1353\/book.119494","author":"andrejevic","year":"2007","journal-title":"iSpy Surveillance and Power in the Interactive Era"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"131","DOI":"10.24908\/ss.v8i2.3482","article-title":"Participatory sensing: Building empowering surveillance","volume":"8","author":"shilton","year":"2010","journal-title":"Surveillance and Society"},{"key":"ref2","year":"2012","journal-title":"Urban Health Profile"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctt9qgrqs","author":"barnes","year":"2007","journal-title":"Power Participation and Political Renewal"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tree.2009.03.017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2012.6423585"},{"key":"ref22","article-title":"Home is safer than the cloud! Privacy concerns for consumer cloud storage","author":"ion","year":"0","journal-title":"Proc of the Seventh Symp on Usable Privacy and Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-012-0087-3"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2013.6637321"},{"key":"ref24","year":"2013","journal-title":"Community attitudes to privacy survey"},{"key":"ref41","article-title":"SmartSantander","year":"2013"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.2307\/41409971","article-title":"Privacy in the digital age: A review of information privacy research in information systems","volume":"35","author":"b\u00e9langer","year":"2011","journal-title":"MIS Quart"},{"key":"ref26","year":"2012","journal-title":"Here there and everywhere—Consumer behaviour and location services"},{"key":"ref43","article-title":"GSMA announces the business impact of connected devices could be worth US$4.5 trillion in 2020","year":"2012"},{"key":"ref25","year":"2013","journal-title":"Digital footprints and identities — Community attitudinal research"}],"container-title":["IEEE Technology and Society Magazine"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/44\/6901308\/06901335.pdf?arnumber=6901335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,2]],"date-time":"2024-06-02T16:49:26Z","timestamp":1717346966000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6901335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":43,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mts.2014.2345203","relation":{},"ISSN":["0278-0097"],"issn-type":[{"value":"0278-0097","type":"print"}],"subject":[],"published":{"date-parts":[[2014]]}}}