---
_id: '4825'
abstract:
- lang: eng
  text: A set of designer guidelines from the European Union offers the first step
    in building privacy-aware systems.
author:
- first_name: Saadi
  full_name: Lahlou, Saadi
  last_name: Lahlou
- first_name: Marc
  full_name: Langheinrich, Marc
  last_name: Langheinrich
- first_name: Carsten
  full_name: Röcker, Carsten
  id: '61525'
  last_name: Röcker
citation:
  ama: Lahlou S, Langheinrich M, Röcker C. Privacy and Trust Issues with Invisible
    Computers. <i>Communications of the ACM</i>. 2005;48(3):59 – 60. doi:<a href="https://doi.org/10.1145/1047671.1047705">10.1145/1047671.1047705</a>
  apa: Lahlou, S., Langheinrich, M., &#38; Röcker, C. (2005). Privacy and Trust Issues
    with Invisible Computers. <i>Communications of the ACM</i>, <i>48</i>(3), 59 –
    60. <a href="https://doi.org/10.1145/1047671.1047705">https://doi.org/10.1145/1047671.1047705</a>
  bjps: <b>Lahlou S, Langheinrich M and Röcker C</b> (2005) Privacy and Trust Issues
    with Invisible Computers. <i>Communications of the ACM</i> <b>48</b>, 59 – 60.
  chicago: 'Lahlou, Saadi, Marc Langheinrich, and Carsten Röcker. “Privacy and Trust
    Issues with Invisible Computers.” <i>Communications of the ACM</i> 48, no. 3 (2005):
    59 – 60. <a href="https://doi.org/10.1145/1047671.1047705">https://doi.org/10.1145/1047671.1047705</a>.'
  chicago-de: 'Lahlou, Saadi, Marc Langheinrich und Carsten Röcker. 2005. Privacy
    and Trust Issues with Invisible Computers. <i>Communications of the ACM</i> 48,
    Nr. 3: 59 – 60. doi:<a href="https://doi.org/10.1145/1047671.1047705,">10.1145/1047671.1047705,</a>
    .'
  din1505-2-1: '<span style="font-variant:small-caps;">Lahlou, Saadi</span> ; <span
    style="font-variant:small-caps;">Langheinrich, Marc</span> ; <span style="font-variant:small-caps;">Röcker,
    Carsten</span>: Privacy and Trust Issues with Invisible Computers. In: <i>Communications
    of the ACM</i> Bd. 48. New York, ACM (2005), Nr. 3, S. 59 – 60'
  havard: S. Lahlou, M. Langheinrich, C. Röcker, Privacy and Trust Issues with Invisible
    Computers, Communications of the ACM. 48 (2005) 59 – 60.
  ieee: S. Lahlou, M. Langheinrich, and C. Röcker, “Privacy and Trust Issues with
    Invisible Computers,” <i>Communications of the ACM</i>, vol. 48, no. 3, pp. 59
    – 60, 2005.
  mla: Lahlou, Saadi, et al. “Privacy and Trust Issues with Invisible Computers.”
    <i>Communications of the ACM</i>, vol. 48, no. 3, ACM, 2005, pp. 59 – 60, doi:<a
    href="https://doi.org/10.1145/1047671.1047705">10.1145/1047671.1047705</a>.
  short: S. Lahlou, M. Langheinrich, C. Röcker, Communications of the ACM 48 (2005)
    59 – 60.
  ufg: '<b>Lahlou, Saadi et. al. (2005)</b>: Privacy and Trust Issues with Invisible
    Computers, in: <i>Communications of the ACM</i> <i>48</i> (<i>3</i>), S. 59 –
    60.'
  van: Lahlou S, Langheinrich M, Röcker C. Privacy and Trust Issues with Invisible
    Computers. Communications of the ACM. 2005;48(3):59 – 60.
date_created: 2021-02-02T10:09:51Z
date_updated: 2023-03-15T13:49:56Z
department:
- _id: DEP5023
doi: 10.1145/1047671.1047705
extern: '1'
intvolume: '        48'
issue: '3'
keyword:
- Communication hardware
- interfaces and storage
- Computing / technology policy
language:
- iso: eng
main_file_link:
- open_access: '1'
oa: '1'
page: 59 – 60
place: New York
publication: Communications of the ACM
publication_identifier:
  eissn:
  - 1557-7317
  issn:
  - 0001-0782
publication_status: published
publisher: ACM
status: public
title: Privacy and Trust Issues with Invisible Computers
type: journal_article
user_id: '15514'
volume: 48
year: 2005
...
