{"id":"https://openalex.org/W2747076919","doi":"https://doi.org/10.1109/giots.2017.8016284","title":"When things are sensors for cloud AI: Protecting privacy through data collection transparency in the age of digital assistants","display_name":"When things are sensors for cloud AI: Protecting privacy through data collection transparency in the age of digital assistants","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2747076919","doi":"https://doi.org/10.1109/giots.2017.8016284","mag":"2747076919"},"language":"en","primary_location":{"id":"doi:10.1109/giots.2017.8016284","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots.2017.8016284","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Global Internet of Things Summit (GIoTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052591090","display_name":"Paul G. Flikkema","orcid":"https://orcid.org/0000-0003-2985-7895"},"institutions":[{"id":"https://openalex.org/I203172682","display_name":"Northern Arizona University","ror":"https://ror.org/0272j5188","country_code":"US","type":"education","lineage":["https://openalex.org/I203172682"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Paul G. Flikkema","raw_affiliation_strings":["Computing and Cyber Systems, Northern Arizona University"],"affiliations":[{"raw_affiliation_string":"Computing and Cyber Systems, Northern Arizona University","institution_ids":["https://openalex.org/I203172682"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064958109","display_name":"Bertrand Cambou","orcid":"https://orcid.org/0000-0001-9272-6527"},"institutions":[{"id":"https://openalex.org/I203172682","display_name":"Northern Arizona University","ror":"https://ror.org/0272j5188","country_code":"US","type":"education","lineage":["https://openalex.org/I203172682"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bertrand Cambou","raw_affiliation_strings":["Computing and Cyber Systems, Northern Arizona University"],"affiliations":[{"raw_affiliation_string":"Computing and Cyber Systems, Northern Arizona University","institution_ids":["https://openalex.org/I203172682"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5052591090"],"corresponding_institution_ids":["https://openalex.org/I203172682"],"apc_list":null,"apc_paid":null,"fwci":0.2253,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.49994047,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.8357033729553223},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7150129675865173},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6891285181045532},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.664452075958252},{"id":"https://openalex.org/keywords/ignorance","display_name":"Ignorance","score":0.6283842325210571},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6047345399856567},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5887244939804077},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.5599579811096191},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.5451558828353882},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.5086284875869751},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4885164499282837}],"concepts":[{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.8357033729553223},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7150129675865173},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6891285181045532},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.664452075958252},{"id":"https://openalex.org/C2778732403","wikidata":"https://www.wikidata.org/wiki/Q815577","display_name":"Ignorance","level":2,"score":0.6283842325210571},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6047345399856567},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5887244939804077},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.5599579811096191},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.5451558828353882},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.5086284875869751},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4885164499282837},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/giots.2017.8016284","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots.2017.8016284","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Global Internet of Things Summit (GIoTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6700000166893005}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1042953836","https://openalex.org/W2095410905","https://openalex.org/W2266218113","https://openalex.org/W2415016544","https://openalex.org/W2511192821","https://openalex.org/W2783117953","https://openalex.org/W2905455284","https://openalex.org/W4210531213","https://openalex.org/W6627249594","https://openalex.org/W6715963930","https://openalex.org/W6747505374"],"related_works":["https://openalex.org/W4387185014","https://openalex.org/W4387906132","https://openalex.org/W4321603833","https://openalex.org/W4321603789","https://openalex.org/W588868971","https://openalex.org/W4200350283","https://openalex.org/W4283215876","https://openalex.org/W4399826833","https://openalex.org/W4253298899","https://openalex.org/W4321603797"],"abstract_inverted_index":{"The":[0],"rapidly":[1],"increasing":[2],"number":[3],"of":[4,65,74,83,116],"intelligent,":[5],"cloud-connected":[6],"things":[7],"that":[8,34,46,93,104,108],"are":[9],"embedded":[10],"in":[11,122],"our":[12],"daily":[13],"lives":[14],"raises":[15],"legitimate":[16],"concerns":[17],"about":[18,56,96],"the":[19,24,66,71,91],"privacy":[20],"costs":[21],"paid":[22],"for":[23],"benefits":[25],"these":[26],"technologies":[27,117],"provide.":[28],"In":[29],"this":[30,35],"paper,":[31],"we":[32],"argue":[33],"is":[36,61,94],"a":[37,44,114,128],"false":[38],"choice,":[39],"and":[40,42,51,98],"motivate":[41],"describe":[43],"technology":[45],"enables":[47],"citizens":[48],"to":[49,62,68,80],"effectively":[50],"conveniently":[52],"monitor":[53],"data":[54,84,92],"collected":[55,95],"them.":[57],"Our":[58],"overarching":[59],"goal":[60],"expand":[63],"awareness":[64],"need":[67],"move":[69],"from":[70],"current":[72],"state":[73],"consumer":[75],"ignorance":[76],"or":[77],"apprehensive":[78],"trust":[79],"an":[81],"era":[82],"collection":[85],"transparency":[86],"(DCT),":[87],"where":[88],"consumers":[89],"understand":[90],"them":[97],"make":[99],"informed":[100],"decisions":[101],"based":[102],"on":[103],"understanding.":[105],"We":[106],"show":[107],"DCT":[109],"can":[110],"be":[111],"achieved":[112],"with":[113,132],"suite":[115],"built":[118],"around":[119],"recent":[120],"developments":[121],"secure":[123],"elements,":[124],"as":[125,127],"well":[126],"virtual":[129],"token":[130],"methodology":[131],"public":[133],"keys":[134],"using":[135],"addressable":[136],"cryptographic":[137],"tables.":[138]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
