[{"doi":"10.1145/1047671.1047705","date_updated":"2023-03-15T13:49:56Z","issue":"3","publisher":"ACM","type":"journal_article","abstract":[{"text":"A set of designer guidelines from the European Union offers the first step in building privacy-aware systems.","lang":"eng"}],"page":"59 – 60","extern":"1","keyword":["Communication hardware","interfaces and storage","Computing / technology policy"],"status":"public","user_id":"15514","year":2005,"department":[{"_id":"DEP5023"}],"main_file_link":[{"open_access":"1"}],"title":"Privacy and Trust Issues with Invisible Computers","place":"New York","citation":{"ama":"Lahlou S, Langheinrich M, Röcker C. Privacy and Trust Issues with Invisible Computers. <i>Communications of the ACM</i>. 2005;48(3):59 – 60. doi:<a href=\"https://doi.org/10.1145/1047671.1047705\">10.1145/1047671.1047705</a>","van":"Lahlou S, Langheinrich M, Röcker C. Privacy and Trust Issues with Invisible Computers. Communications of the ACM. 2005;48(3):59 – 60.","ieee":"S. Lahlou, M. Langheinrich, and C. Röcker, “Privacy and Trust Issues with Invisible Computers,” <i>Communications of the ACM</i>, vol. 48, no. 3, pp. 59 – 60, 2005.","chicago":"Lahlou, Saadi, Marc Langheinrich, and Carsten Röcker. “Privacy and Trust Issues with Invisible Computers.” <i>Communications of the ACM</i> 48, no. 3 (2005): 59 – 60. <a href=\"https://doi.org/10.1145/1047671.1047705\">https://doi.org/10.1145/1047671.1047705</a>.","bjps":"<b>Lahlou S, Langheinrich M and Röcker C</b> (2005) Privacy and Trust Issues with Invisible Computers. <i>Communications of the ACM</i> <b>48</b>, 59 – 60.","din1505-2-1":"<span style=\"font-variant:small-caps;\">Lahlou, Saadi</span> ; <span style=\"font-variant:small-caps;\">Langheinrich, Marc</span> ; <span style=\"font-variant:small-caps;\">Röcker, Carsten</span>: Privacy and Trust Issues with Invisible Computers. In: <i>Communications of the ACM</i> Bd. 48. New York, ACM (2005), Nr. 3, S. 59 – 60","havard":"S. Lahlou, M. Langheinrich, C. Röcker, Privacy and Trust Issues with Invisible Computers, Communications of the ACM. 48 (2005) 59 – 60.","ufg":"<b>Lahlou, Saadi et. al. (2005)</b>: Privacy and Trust Issues with Invisible Computers, in: <i>Communications of the ACM</i> <i>48</i> (<i>3</i>), S. 59 – 60.","chicago-de":"Lahlou, Saadi, Marc Langheinrich und Carsten Röcker. 2005. Privacy and Trust Issues with Invisible Computers. <i>Communications of the ACM</i> 48, Nr. 3: 59 – 60. doi:<a href=\"https://doi.org/10.1145/1047671.1047705,\">10.1145/1047671.1047705,</a> .","short":"S. Lahlou, M. Langheinrich, C. Röcker, Communications of the ACM 48 (2005) 59 – 60.","mla":"Lahlou, Saadi, et al. “Privacy and Trust Issues with Invisible Computers.” <i>Communications of the ACM</i>, vol. 48, no. 3, ACM, 2005, pp. 59 – 60, doi:<a href=\"https://doi.org/10.1145/1047671.1047705\">10.1145/1047671.1047705</a>.","apa":"Lahlou, S., Langheinrich, M., &#38; Röcker, C. (2005). Privacy and Trust Issues with Invisible Computers. <i>Communications of the ACM</i>, <i>48</i>(3), 59 – 60. <a href=\"https://doi.org/10.1145/1047671.1047705\">https://doi.org/10.1145/1047671.1047705</a>"},"date_created":"2021-02-02T10:09:51Z","language":[{"iso":"eng"}],"publication_status":"published","volume":48,"intvolume":"        48","author":[{"first_name":"Saadi","full_name":"Lahlou, Saadi","last_name":"Lahlou"},{"first_name":"Marc","full_name":"Langheinrich, Marc","last_name":"Langheinrich"},{"first_name":"Carsten","last_name":"Röcker","id":"61525","full_name":"Röcker, Carsten"}],"publication_identifier":{"eissn":["1557-7317"],"issn":["0001-0782"]},"oa":"1","_id":"4825","publication":"Communications of the ACM"}]
