{"user_id":"15514","author":[{"first_name":"Saadi","full_name":"Lahlou, Saadi","last_name":"Lahlou"},{"first_name":"Marc","full_name":"Langheinrich, Marc","last_name":"Langheinrich"},{"last_name":"Röcker","full_name":"Röcker, Carsten","id":"61525","first_name":"Carsten"}],"extern":"1","status":"public","main_file_link":[{"open_access":"1"}],"publication":"Communications of the ACM","title":"Privacy and Trust Issues with Invisible Computers","_id":"4825","abstract":[{"lang":"eng","text":"A set of designer guidelines from the European Union offers the first step in building privacy-aware systems."}],"intvolume":" 48","publication_status":"published","volume":48,"page":"59 – 60","citation":{"apa":"Lahlou, S., Langheinrich, M., & Röcker, C. (2005). Privacy and Trust Issues with Invisible Computers. Communications of the ACM, 48(3), 59 – 60. https://doi.org/10.1145/1047671.1047705","van":"Lahlou S, Langheinrich M, Röcker C. Privacy and Trust Issues with Invisible Computers. Communications of the ACM. 2005;48(3):59 – 60.","chicago-de":"Lahlou, Saadi, Marc Langheinrich und Carsten Röcker. 2005. Privacy and Trust Issues with Invisible Computers. Communications of the ACM 48, Nr. 3: 59 – 60. doi:10.1145/1047671.1047705, .","short":"S. Lahlou, M. Langheinrich, C. Röcker, Communications of the ACM 48 (2005) 59 – 60.","ufg":"Lahlou, Saadi et. al. (2005): Privacy and Trust Issues with Invisible Computers, in: Communications of the ACM 48 (3), S. 59 – 60.","ieee":"S. Lahlou, M. Langheinrich, and C. Röcker, “Privacy and Trust Issues with Invisible Computers,” Communications of the ACM, vol. 48, no. 3, pp. 59 – 60, 2005.","havard":"S. Lahlou, M. Langheinrich, C. Röcker, Privacy and Trust Issues with Invisible Computers, Communications of the ACM. 48 (2005) 59 – 60.","bjps":"Lahlou S, Langheinrich M and Röcker C (2005) Privacy and Trust Issues with Invisible Computers. Communications of the ACM 48, 59 – 60.","mla":"Lahlou, Saadi, et al. “Privacy and Trust Issues with Invisible Computers.” Communications of the ACM, vol. 48, no. 3, ACM, 2005, pp. 59 – 60, doi:10.1145/1047671.1047705.","din1505-2-1":"Lahlou, Saadi ; Langheinrich, Marc ; Röcker, Carsten: Privacy and Trust Issues with Invisible Computers. In: Communications of the ACM Bd. 48. New York, ACM (2005), Nr. 3, S. 59 – 60","ama":"Lahlou S, Langheinrich M, Röcker C. Privacy and Trust Issues with Invisible Computers. Communications of the ACM. 2005;48(3):59 – 60. doi:10.1145/1047671.1047705","chicago":"Lahlou, Saadi, Marc Langheinrich, and Carsten Röcker. “Privacy and Trust Issues with Invisible Computers.” Communications of the ACM 48, no. 3 (2005): 59 – 60. https://doi.org/10.1145/1047671.1047705."},"doi":"10.1145/1047671.1047705","publication_identifier":{"issn":["0001-0782"],"eissn":["1557-7317"]},"date_created":"2021-02-02T10:09:51Z","issue":"3","type":"journal_article","year":2005,"oa":"1","publisher":"ACM","date_updated":"2023-03-15T13:49:56Z","department":[{"_id":"DEP5023"}],"language":[{"iso":"eng"}],"place":"New York","keyword":["Communication hardware","interfaces and storage","Computing / technology policy"]}