[{"publisher":"ACM","type":"journal_article","date_updated":"2023-03-15T13:49:56Z","doi":"10.1145/1047671.1047705","issue":"3","status":"public","year":2005,"user_id":"15514","department":[{"_id":"DEP5023"}],"abstract":[{"lang":"eng","text":"A set of designer guidelines from the European Union offers the first step in building privacy-aware systems."}],"page":"59 – 60","extern":"1","keyword":["Communication hardware","interfaces and storage","Computing / technology policy"],"citation":{"short":"S. Lahlou, M. Langheinrich, C. Röcker, Communications of the ACM 48 (2005) 59 – 60.","apa":"Lahlou, S., Langheinrich, M., &#38; Röcker, C. (2005). Privacy and Trust Issues with Invisible Computers. <i>Communications of the ACM</i>, <i>48</i>(3), 59 – 60. <a href=\"https://doi.org/10.1145/1047671.1047705\">https://doi.org/10.1145/1047671.1047705</a>","mla":"Lahlou, Saadi, et al. “Privacy and Trust Issues with Invisible Computers.” <i>Communications of the ACM</i>, vol. 48, no. 3, ACM, 2005, pp. 59 – 60, doi:<a href=\"https://doi.org/10.1145/1047671.1047705\">10.1145/1047671.1047705</a>.","ufg":"<b>Lahlou, Saadi et. al. (2005)</b>: Privacy and Trust Issues with Invisible Computers, in: <i>Communications of the ACM</i> <i>48</i> (<i>3</i>), S. 59 – 60.","chicago-de":"Lahlou, Saadi, Marc Langheinrich und Carsten Röcker. 2005. Privacy and Trust Issues with Invisible Computers. <i>Communications of the ACM</i> 48, Nr. 3: 59 – 60. doi:<a href=\"https://doi.org/10.1145/1047671.1047705,\">10.1145/1047671.1047705,</a> .","havard":"S. Lahlou, M. Langheinrich, C. Röcker, Privacy and Trust Issues with Invisible Computers, Communications of the ACM. 48 (2005) 59 – 60.","bjps":"<b>Lahlou S, Langheinrich M and Röcker C</b> (2005) Privacy and Trust Issues with Invisible Computers. <i>Communications of the ACM</i> <b>48</b>, 59 – 60.","din1505-2-1":"<span style=\"font-variant:small-caps;\">Lahlou, Saadi</span> ; <span style=\"font-variant:small-caps;\">Langheinrich, Marc</span> ; <span style=\"font-variant:small-caps;\">Röcker, Carsten</span>: Privacy and Trust Issues with Invisible Computers. In: <i>Communications of the ACM</i> Bd. 48. New York, ACM (2005), Nr. 3, S. 59 – 60","chicago":"Lahlou, Saadi, Marc Langheinrich, and Carsten Röcker. “Privacy and Trust Issues with Invisible Computers.” <i>Communications of the ACM</i> 48, no. 3 (2005): 59 – 60. <a href=\"https://doi.org/10.1145/1047671.1047705\">https://doi.org/10.1145/1047671.1047705</a>.","ieee":"S. Lahlou, M. Langheinrich, and C. Röcker, “Privacy and Trust Issues with Invisible Computers,” <i>Communications of the ACM</i>, vol. 48, no. 3, pp. 59 – 60, 2005.","ama":"Lahlou S, Langheinrich M, Röcker C. Privacy and Trust Issues with Invisible Computers. <i>Communications of the ACM</i>. 2005;48(3):59 – 60. doi:<a href=\"https://doi.org/10.1145/1047671.1047705\">10.1145/1047671.1047705</a>","van":"Lahlou S, Langheinrich M, Röcker C. Privacy and Trust Issues with Invisible Computers. Communications of the ACM. 2005;48(3):59 – 60."},"place":"New York","volume":48,"publication_status":"published","language":[{"iso":"eng"}],"date_created":"2021-02-02T10:09:51Z","author":[{"first_name":"Saadi","full_name":"Lahlou, Saadi","last_name":"Lahlou"},{"first_name":"Marc","last_name":"Langheinrich","full_name":"Langheinrich, Marc"},{"first_name":"Carsten","id":"61525","last_name":"Röcker","full_name":"Röcker, Carsten"}],"intvolume":"        48","publication_identifier":{"eissn":["1557-7317"],"issn":["0001-0782"]},"main_file_link":[{"open_access":"1"}],"title":"Privacy and Trust Issues with Invisible Computers","publication":"Communications of the ACM","oa":"1","_id":"4825"}]
