The PETRAS Internet of Things Research Hub
https://www.petrashub.org/outputs/
Ahlfeldt, G., Koutroumpis, P., & Valletti, T. (2017). Speed 2.0: Evaluating Access to Universal Digital Highways. Journal of the European Economic Association, 15(3), 586–625. Retrieved from http://dx.doi.org/10.1093/jeea/jvw013
Akmal, H., & Coulton, P. (2018). Using Heterotopias to Characterise Interactions in Physical/Digital Spaces. Retrieved from http://eprints.lancs.ac.uk/123792/
Alberts, G., Gurguc, Z., Koutroumpis, P., Martin, R., Muûls, M., & Napp, T. (2016). Competition and norms: A self-defeating combination? Energy Policy, 96, 504–523. Retrieved from https://spiral.imperial.ac.uk/bitstream/10044/1/33898/9/Competition and norms.pdf
Aldrich, R. J., & Richterova, D. (2018). Ambient accountability: intelligence services in Europe and the decline of state secrecy. West European Politics, 41(4), 1003–1024. http://doi.org/10.1080/01402382.2017.1415780
Anthi, E., Williams, L., & Burnap, P. (2018). Pulse: An adaptive intrusion detection for the Internet of Things. In Living in the Internet of Things: Cybersecurity of the IoT – 2018 (pp. 1–4). http://doi.org/10.1049/cp.2018.0035
Anthonysamy, P., Rashid, A., & Chitchyan, R. (2017). Privacy Requirements: Present & Future. In Proceedings of the 39th International Conference on Software Engineering: Software Engineering in Society Track (pp. 13–22). Piscataway, NJ, USA: IEEE Press. http://doi.org/10.1109/ICSE-SEIS.2017.3
Arapinis, M., Liu, J., Ritter, E., & Ryan, M. (2017). Stateful applied pi calculus: Observational equivalence and labelled bisimilarity. Journal of Logical and Algebraic Methods in Programming, 89, 95–149. http://doi.org/https://doi.org/10.1016/j.jlamp.2017.03.001
Asuquo, P., Cruickshank, H., Morley, J., Ogah, C. P. A., Lei, A., Hathal, W., … Sun, Z. (2018). Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges and Countermeasures. IEEE Internet of Things Journal, 1. http://doi.org/10.1109/JIOT.2018.2820039
Asuquo, P., Cruickshank, H., Ogah, C. P. A., Lei, A., & Sun, Z. (2018). A Distributed Trust Management Scheme for Data Forwarding in Satellite DTN Emergency Communications. IEEE Journal on Selected Areas in Communications, 36(2), 246–256. http://doi.org/10.1109/JSAC.2018.2804098
Bao, S., Hathal, W., Cruickshank, H., Sun, Z., Asuquo, P., & Lei, A. (2018). A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters. ICT Express. http://doi.org/10.1016/j.icte.2017.12.001
Beck, S., Finney, J., & Knowles, B. H. (2018). How Freya Built Sharkie: Initial explorations into the safety, security, and privacy concerns of children’s IoT devices. In London Computing Education Research Symposium. Retrieved from http://eprints.lancs.ac.uk/126151/
Binns, R. (2017). Fairness in Machine Learning: Lessons from Political Philosophy. ArXiv Preprint ArXiv:1712.03586. Retrieved from https://arxiv.org/abs/1712.03586
Binns, R., Van Kleek, M., Veale, M., Lyngs, U., Zhao, J., & Shadbolt, N. (2018). “It’s Reducing a Human Being to a Percentage”: Perceptions of Justice in Algorithmic Decisions. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (p. 377:1–377:14). New York, NY, USA: ACM. http://doi.org/10.1145/3173574.3173951
Blackstock, J. (2018). Standardising a Moving Target: The Development and Evolution of IoT Security Standards. IET Conference Proceedings, 24 (9 pp.)-24 (9 pp.)(1). Retrieved from http://digital-library.theiet.org/content/conferences/10.1049/cp.2018.0024
Blythe, J. M., Michie, S., Watson, J., & Lefevre, C. E. (n.d.). Internet of Things in Healthcare: Identifying key malicious threats, end-user protective and problematic behaviours. Retrieved from https://www.ucl.ac.uk/behaviour-change/events/presentations-17/blythe.pdf
Blythe, J. M., & Lefevre, C. E. (2017). Cyberhygiene Insight Report. Retrieved from https://iotuk.org.uk/wp-content/uploads/2018/01/PETRAS-IoTUK-Cyberhygiene-Insight-Report.pdf
Boyes, H., Hallaq, B., Cunningham, J., & Watson, T. (2018). The industrial internet of things (IIoT): An analysis framework. Computers in Industry, 101, 1–12. http://doi.org/https://doi.org/10.1016/j.compind.2018.04.015
Bradbury, M., & Jhumka, A. (2017). Understanding source location privacy protocols in sensor networks via perturbation of time series. In IEEE INFOCOM 2017 – IEEE Conference on Computer Communications (pp. 1–9). http://doi.org/10.1109/INFOCOM.2017.8057122
Bradbury, M., & Jhumka, A. (2017). A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks. In 2017 IEEE Trustcom/BigDataSE/ICESS (pp. 409–416). http://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.265
Bradbury, M., Jhumka, A., & Leeke, M. (2018). Hybrid online protocols for source location privacy in wireless sensor networks. Journal of Parallel and Distributed Computing, 115, 67–81. http://doi.org/https://doi.org/10.1016/j.jpdc.2018.01.006
Brass, I. C. (2018). Standardising IoT Security: Implications for Digital Forensics. Digital Forensics Magazine, (35), 44–48. Retrieved from http://discovery.ucl.ac.uk/10050054/13/Brass_BRA001-pdf.pdf
Brass, I. C., Sowell, J., Carr, M., & Blackstock, J. (2017). The Role of Transnational Expert Associations in Governing the Cybersecurity Risks of the Internet of Things. International Public Policy Association. Retrieved from http://discovery.ucl.ac.uk/10054015/1/59530f6763ae8.pdf
Brass, I. (2017). Cybersecurity and Liability in Autonomous and Intelligent Transport.
Brass, I., Tanczer, L., Maple, C., Blackstock, J., & Carr, M. (2018). Unbundling the emerging cyber-physical risks in connected and autonomous vehicles. Retrieved from https://alerts.pinsentmasons.com/rs/emsdocuments/Future-of-the-Car-Whitepaper-Pinsent-Masons.pdf
Breza, M., Tomic, I., & McCann, J. (2018). Failures from the Environment, a Report on the First FAILSAFE Workshop. SIGCOMM Comput. Commun. Rev., 48(2), 40–45. http://doi.org/10.1145/3213232.3213238
Bures, T., Weyns, D., Schmer, B., Tovar, E., Boden, E., Gabor, T., … Tsigkanos, C. (2017). Software Engineering for Smart Cyber-Physical Systems: Challenges and Promising Solutions. SIGSOFT Softw. Eng. Notes, 42(2), 19–24. http://doi.org/10.1145/3089649.3089656
Calvo, J. L., Tindemans, S. H., & Strbac, G. (2016). Incorporating failures of System Protection Schemes into power system operation. Sustainable Energy, Grids and Networks, 8, 98–110. Retrieved from https://www.sciencedirect.com/science/article/pii/S2352467716301242
Cath, C., Wachter, S., Mittelstadt, B., Taddeo, M., & Floridi, L. (2018). Artificial Intelligence and the ‘Good Society’: the US, EU, and UK approach. Science and Engineering Ethics, 24(2), 505–528. http://doi.org/10.1007/s11948-017-9901-7
Catlow, R., Garrett, M., Jones, N., & Skinner, S. (2017). Artists Re: thinking the Blockchain (Vol. 1). Torque editions. Retrieved from http://eprints.lancs.ac.uk/124584/
Chen, S., Lach, J., Lo, B., & Yang, G.-Z. (2016). Toward Pervasive Gait Analysis With Wearable Sensors: A Systematic Review. IEEE J. Biomedical and Health Informatics, 20(6), 1521–1537. Retrieved from https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7574303
Chizari, H., Lupu, E., & Thomas, P. (2018). Randomness of physiological signals in generation cryptographic key for secure communication between implantable medical devices inside the body and the outside world. Living in the Internet of Things: Cybersecurity of the IoT – 2018, 27 (6 pp.)-27 (6 pp.). http://doi.org/10.1049/cp.2018.0027
Choi, D.-W., Pei, J., & Heinis, T. (2017). Efficient Mining of Regional Movement Patterns in Semantic Trajectories. Proc. VLDB Endow., 10(13), 2073–2084. http://doi.org/10.14778/3151106.3151111
Coulton, P., & Lindley, J. (2017). Design Fiction: Anticipating Adoption. IEEE Pervasive Computing, 16(1), 43–47. http://doi.org/10.1109/MPRV.2017.5
Coulton, P., Lindley, J., & Cooper, R. (2018). The Little Book of Design Fiction. (C. Coulton, Ed.). Retrieved from https://www.petrashub.org/the-little-book-of-design-fiction-for-the-internet-of-things/
Craggs, B., & Rashid, A. (2017). Smart Cyber-Physical Systems: Beyond Usable Security to Security Ergonomics by Design. In 2017 IEEE/ACM 3rd International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS) (pp. 22–25). http://doi.org/10.1109/SEsCPS.2017.5
Davies, N., Clinch, S., Mikusz, M., Bates, O., Turner, H., & Friday, A. (2017). Better off: when should pervasive displays be powered down? In Proceedings of the 6th ACM International Symposium on Pervasive Displays (p. 19). ACM. Retrieved from https://core.ac.uk/download/pdf/83920831.pdf
Deligianni, F., Wong, C., Lo, B., & Yang, G. Z. (2018). A fusion framework to estimate plantar ground force distributions and ankle dynamics. Information Fusion. http://doi.org/10.1016/j.inffus.2017.09.008
Dianati, M., Shen, X., & Naik, S. (2005). A new fairness index for radio resource allocation in wireless networks. In IEEE Wireless Communications and Networking Conference, 2005 (Vol. 2, p. 712–717 Vol. 2). http://doi.org/10.1109/WCNC.2005.1424595
Edwards, M., Larson, R., Green, B., Rashid, A., & Baron, A. (2017). Panning for gold: Automatically analysing online social engineering attack surfaces. Computers & Security, 69, 18–34. http://doi.org/https://doi.org/10.1016/j.cose.2016.12.013
Floridi, L. (2018). Soft Ethics and the Governance of the Digital. Philosophy & Technology, 31(1), 1–8.
http://doi.org/10.1007/s13347-018-0303-9
Floridi, L. (2016). Faultless responsibility: on the nature and allocation of moral responsibility for distributed moral actions. Phil. Trans. R. Soc. A, 374(2083), 20160112. Retrieved from
http://rsta.royalsocietypublishing.org/content/374/2083/20160112
Floridi, L., & Taddeo, M. (2016). What is data ethics? Philosophical Transactions. Series A, Mathematical, Physical, and Engineering Sciences, 374(2083), 20160360. http://doi.org/10.1098/rsta.2016.0360
Furnell, S. (2018). Information security collaboration formation in organisations. IET Information Security, 12(3), 238–245(7). Retrieved from http://digital-library.theiet.org/content/journals/10.1049/iet-ifs.2017.0257
Ghirardello, K., Maple, C., Ng, D., & Kearney, P. (2018). Cyber security of smart homes: development of a reference architecture for attack surface analysis. Living in the Internet of Things: Cybersecurity of the IoT – 2018, 45 (10 pp.)-45 (10 pp.)(1). http://doi.org/10.1049/cp.2018.0045
Gu, C., Bradbury, M., & Jhumka, A. (2017). Phantom Walkabouts in Wireless Sensor Networks. In Proceedings of the Symposium on Applied Computing (pp. 609–616). New York, NY, USA: ACM. http://doi.org/10.1145/3019612.3019732
Gu, C., Bradbury, M., Kirton, J., & Jhumka, A. (2018). A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks. Future Generation Computer Systems. http://doi.org/10.1016/j.future.2018.01.046
Hadian, A., & Heinis, T. (2018). Towards Batch-Processing on Cold Storage Devices. In 2018 IEEE 34th International Conference on Data Engineering Workshops (ICDEW) (pp. 134–139). http://doi.org/10.1109/ICDEW.2018.00028
Hay, D., Buyuklieva, B., Daothong, J., Edmonds, B., Hudson-Smith, A., Milton, R., & Wood, J. (2018). IoT in the wild: what negotiating public deployments can tell us about the state of the Internet of Things. Living in the Internet of Things: Cybersecurity of the IoT – 2018, 17 (6 pp.)-17 (6 pp.)(1). http://doi.org/10.1049/cp.2018.0017
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., & Gabrys, B. (2016). The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In Evolutionary Computation (CEC), 2016 IEEE Congress on (pp. 1015–1021). IEEE. Retrieved from http://eprints.bournemouth.ac.uk/24677/1/He_et_al_IoT_Challenges_CEC_2016.pdf
Heinis, T., & Ailamaki, A. (2017). Data Infrastructure for Medical Research. Foundations and Trends® in Databases, 8(3), 131–238. http://doi.org/10.1561/1900000050
HM Government. (2015). Digital Built Britain Level 3 Building Information Modelling – Strategic Plan. Digital Built Britain, (February), 1–47. http://doi.org/URN BIS/15/155
Illiano, V. P., Paudice, A., Muñoz-González, L., & Lupu, E. C. (2018). Determining Resilience Gains From Anomaly Detection for Event Integrity in Wireless Sensor Networks. ACM Transactions on Sensor Networks (TOSN), 14(1), 5. Retrieved from https://spiral.imperial.ac.uk/handle/10044/1/55080
Ivanov, I., Maple, C., Watson, T., & Lee, S. (2018). Cyber security standards and issues in V2X communications for Internet of Vehicles. In Living in the Internet of Things: Cybersecurity of the IoT – 2018 (pp. 1–6). http://doi.org/10.1049/cp.2018.0046
Janeček, V. (2018). Ownership of personal data in the Internet of Things. Computer Law & Security Review, 34(5), 1039–1052. http://doi.org/https://doi.org/10.1016/j.clsr.2018.04.007
Jhumka, A., & Bradbury, M. (2017). Deconstructing Source Location Privacy-aware Routing Protocols. In Proceedings of the Symposium on Applied Computing (pp. 431–436). New York, NY, USA: ACM. http://doi.org/10.1145/3019612.3019655
Jhumka, A., & Mottola, L. (2016). Neighborhood view consistency in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 12(3), 19. Retrieved from https://re.public.polimi.it/retrieve/handle/11311/1027581/213771/jhumka16view.pdf
Katsaros, K., & Dianati, M. (2017). A cost-effective SCTP extension for hybrid vehicular networks. Journal of Communications and Information Networks, 2(2), 18–29. Retrieved from https://link.springer.com/article/10.1007/s41650-017-0021-y
Kirton, J., Bradbury, M., & Jhumka, A. (2017). Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (pp. 2200–2205). http://doi.org/10.1109/ICDCS.2017.171
Kleek, M. Van, Seymour, W., Binns, R., & Shadbolt, N. (2018). Respectful things: Adding social intelligence to “smart” devices. In Living in the Internet of Things: Cybersecurity of the IoT – 2018 (pp. 1–6). http://doi.org/10.1049/cp.2018.0006
Knowles, B., Finney, J., Beck, S., & Devine, J. (2018). What children’s imagined uses of the BBC micro:bit tells us about designing for their IoT privacy, security and safety. In Living in the Internet of Things: Cybersecurity of the IoT – 2018 (pp. 1–6). http://doi.org/10.1049/cp.2018.0015
Kolodenker, E., Koch, W., Stringhini, G., & Egele, M. (2017). PayBreak: Defense against cryptographic ransomware. In Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security (ASIACCS) (pp. 599–611). ACM (Association for Computing Machinery). Retrieved from http://www0.cs.ucl.ac.uk/staff/G.Stringhini/papers/ransomware-ASIACCS2017.pdf
Koutroumpis, P., & Leiponen, A. (2016). Crowdsourcing mobile coverage. Telecommunications Policy, 40(6), 532–544. Retrieved from https://www.sciencedirect.com/science/article/abs/pii/S0308596116000410
Langheinrich, M. (2018). Raising Awareness of IoT Sensor Deployments. IET Conference Proceedings, 9 (8 pp.)-9 (8 pp.)(1). Retrieved from http://digital-library.theiet.org/content/conferences/10.1049/cp.2018.0009
Latinopoulos, C., Sivakumar, A., & Polak, J. W. (2017). Response of electric vehicle drivers to dynamic pricing of parking and charging services: Risky choice in early reservations. Transportation Research Part C: Emerging Technologies, 80, 175–189. http://doi.org/https://doi.org/10.1016/j.trc.2017.04.008
Latinopoulos, C., Daina, N., & Polak, J. W. (2018). Trust in IoT-enabled mobility services: Predictive analytics and the impact of prediction errors on the quality of service in bike sharing. IET Conference Publications, 2018(CP740), 44 (7 pp.)-44 (7 pp.)(1). http://doi.org/10.1016/0013-7944(92)90299-T
Le Vine, S., Kong, Y., Liu, X., & Polak, J. (2017). Vehicle automation and freeway ‘pipeline’ capacity in the context of legal standards of care. Transportation. http://doi.org/10.1007/s11116-017-9825-8
Le Vine, S., & Polak, J. (2017). The impact of free-floating carsharing on car ownership: Early-stage findings from London. Transport Policy. http://doi.org/https://doi.org/10.1016/j.tranpol.2017.02.004
Lei, A., Cruickshank, H., Cao, Y., Asuquo, P., Ogah, C. P. A., & Sun, Z. (2017). Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet of Things Journal, 4(6), 1832–1843. Retrieved from https://ieeexplore.ieee.org/abstract/document/8010820
Li, T., Heinis, T., & Luk, W. (2017). ADvaNCE–Efficient and Scalable Approximate Density-Based Clustering Based on Hashing. Informatica, 28(1), 105–130. Retrieved from https://www.mii.lt/informatica/pdf/INFO1136.pdf
Lindley, J. G., & Coulton, P. (2017). On the Internet Everybody Knows You’re a Whatchamacallit (or a Thing). In CHI 2017 Workshop. Retrieved from http://eprints.lancs.ac.uk/84761/
Lindley, J. G., Coulton, P., & Akmal, H. (2018). Turning Philosophy with a Speculative Lathe: Object Oriented Ontology, Carpentry, and Design Fiction.
Lindley, J. G., Coulton, P., Akmal, H., & Knowles, B. H. (2017). Anticipating GDPR in Smart Homes Through Fictional Conversational Objects. Retrieved from http://eprints.lancs.ac.uk/87438/1/Anticipating_GDPR_in_Smart_Homes_Through_Fictional_Conversational_Objects.pdf
Lindley, J., Coulton, P., & Cooper, R. (2017). Why the Internet of Things needs Object Orientated Ontology. The Design Journal, 20(sup1), S2846–S2857. http://doi.org/10.1080/14606925.2017.1352796
Lindley, J., Coulton, P., & Cooper, R. (2017). Not on Demand: Internet of Things Enabled Energy Temporality. In Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems (pp. 23–27). New York, NY, USA: ACM. http://doi.org/10.1145/3064857.3079112
Lindley, J., Coulton, P., & Sturdee, M. (2017). Implications for Adoption. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 265–277). New York, NY, USA: ACM. http://doi.org/10.1145/3025453.3025742
Liu, J., Jager, T., Kakvi, S. A., & Warinschi, B. (2018). How to build time-lock encryption. Designs, Codes and Cryptography, 86(11), 2549–2586. http://doi.org/10.1007/s10623-018-0461-x
Lo, B. P. L., Ip, H., & Yang, G.-Z. (2016). Transforming health care: body sensor networks, wearables, and the Internet of Things. Retrieved from https://spiral.imperial.ac.uk/bitstream/10044/1/33458/3/Transforming Heathcare v3_ed_BL_Oct 30 2015.pdf
Lombardi, F., Aniello, L., De Angelis, S., Margheri, A., & Sassone, V. (2018). A Blockchain-based Infrastructure for Reliable and Cost-effective IoT-aided Smart Grids. In Living in the Internet of Things: Cybersecurity of the IoT – 2018. http://doi.org/10.1049/cp.2018.0042
Lundbæk, L.-N., Janes Beutel, D., Huth, M., Jackson, S., Kirk, L., & Steiner, R. (2018). Proof of Kernel Work: a democratic low-energy consensus for distributed access-control protocols. Royal Society Open Science, 5(8). Retrieved from http://rsos.royalsocietypublishing.org/content/5/8/180422.abstract
Lustgarten, P., & Le Vine, S. (2018). Public priorities and consumer preferences for selected attributes of automated vehicles. Journal of Modern Transportation, 26(1), 72–79. http://doi.org/10.1007/s40534-017-0147-5
Mace, J. C., Morisset, C., Pierce, K., Gamble, C., Maple, C., & Fitzgerald, J. (2018). A multi-modelling based approach to assessing the security of smart buildings. IET. Retrieved from https://ieeexplore.ieee.org/abstract/document/8379718
Maxwell, D., Speed, C., & Pschetz, L. (2017). Story Blocks: Reimagining narrative through the blockchain. Convergence, 23(1), 79–97. http://doi.org/10.1177/1354856516675263
Mike, D., Susan, Y. L. W., Irene, C. L. N., & Carsten, M. (2017). Consumer Perceived Vulnerability, privacy calculus and information disclosure: an empirical investigation in retailer loyalty program. In Naples Forum on Service. Sorrento, Italy.
Mikusz, M., Bates, O., Clinch, S., Davies, N., Friday, A., & Noulas, A. (2016). Poster: Understanding Mobile User Interactions with the IoT. Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion, 1(Jan 2015), 140. http://doi.org/10.1145/2938559.2938607
Mikusz, M., Clinch, S., Shaw, P., Davies, N., & Nurmi, P. (2018). Using Pervasive Displays to Aid Student Recall -Reflections on a Campus-Wide Trial. In Proceedings of the 7th ACM International Symposium on Pervasive Displays (p. 6:1–6:8). New York, NY, USA: ACM. http://doi.org/10.1145/3205873.3205882
Mikusz, M., Noulas, A., Davies, N., Clinch, S., & Friday, A. (2016). Next generation physical analytics for digital signage. In Proceedings of the 3rd International on Workshop on Physical Analytics (pp. 19–24). ACM. Retrieved from http://eprints.lancs.ac.uk/80300/1/Next_Generation_Physical_Analytics_for_Digital_Signage.pdf
Milton, R., Hay, D., Gray, S., Buyuklieva, B., & Hudson-Smith, A. (2018). Smart IoT and soft AI. IET Conference Publications, 2018(CP740), 16 (6 pp.)-16 (6 pp.)(1). http://doi.org/10.1049/cp.2018.0016
Milton, R., Buyuklieva, B., Hay, D., Hudson-Smith, A., & Gray, S. (2018). Talking to GNOMEs: Exploring Privacy and Trust Around Internet of Things Devices in a Public Space. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (p. LBW632:1–LBW632:6). New York, NY, USA: ACM. http://doi.org/10.1145/3170427.3188481
Mistry, M., D’Iddio, A. C., Huth, M., & Misener, R. (2018). Satisfiability modulo theories for process systems engineering. Computers & Chemical Engineering, 113, 98–114. http://doi.org/https://doi.org/10.1016/j.compchemeng.2018.03.004
Mittelstadt, B. (2017). From Individual to Group Privacy in Big Data Analytics. Philosophy & Technology, 30(4), 475–494. http://doi.org/10.1007/s13347-017-0253-7
Mittelstadt, B. (2017). Ethics of the health-related internet of things: a narrative review. Ethics and Information Technology, 19(3), 157–175. http://doi.org/10.1007/s10676-017-9426-4
Mittelstadt, B. (2017). Designing the Health-related Internet of Things: Ethical Principles and Guidelines. Information. http://doi.org/10.3390/info8030077
Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society, 3(2), 2053951716679679. Retrieved from http://journals.sagepub.com/doi/pdf/10.1177/2053951716679679
Mukisa, S. S., & Rashid, A. (2017). Challenges of Privacy Requirements Modelling in V2X Applications: A Telematic Insurance Case Study. In 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW) (pp. 97–103). http://doi.org/10.1109/REW.2017.48
Muñoz-González, L., & Lupu, E. C. (2019). The Security of Machine Learning Systems BT – AI in Cybersecurity. In L. F. Sikos (Ed.), (pp. 47–79). Cham: Springer International Publishing. http://doi.org/10.1007/978-3-319-98842-9_3
Ng, I. C. L., & Wakenshaw, S. Y. L. (2017). The Internet of Things: Review and Research Directions. International Journal of Research in Marketing, 34(1), 3–21. http://doi.org/10.1016/j.ijresmar.2016.11.003
Nissen, B., Symons, K., Tallyn, E., Speed, C., Maxwell, D., & Vines, J. (2017). New Value Transactions: Understanding and Designing for Distributed Autonomous Organisations. In Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems (pp. 352–355). New York, NY, USA: ACM. http://doi.org/10.1145/3064857.3064862
Nurse, J. R. C., Creese, S., & Roure, D. De. (2017). Security Risk Assessment in Internet of Things Systems. IT Professional, 19(5), 20–26. http://doi.org/10.1109/MITP.2017.3680959
Nurse, J. R. C., Radanliev, P., Creese, S., & De Roure, D. (2018). If you can’t understand it, you can’t properly assess it! The reality of assessing security risks in Internet of Things systems. IET Conference Proceedings. http://doi.org/10.1049/cp.2018.0001
Oehmichen, A., Guitton, F., Sun, K., Grizet, J., Heinis, T., & Guo, Y. (2017). eTRIKS analytical environment: A modular high performance framework for medical data analysis. In 2017 IEEE International Conference on Big Data (Big Data) (pp. 353–360). http://doi.org/10.1109/BigData.2017.8257945
Olma, M., Tauheed, F., Heinis, T., & Ailamaki, A. (2017). BLOCK: Efficient Execution of Spatial Range Queries in Main-Memory. In Proceedings of the 29th International Conference on Scientific and Statistical Database Management (p. 15:1–15:12). New York, NY, USA: ACM. http://doi.org/10.1145/3085504.3085519
Pavlovic, M., Heinis, T., Tauheed, F., Karras, P., & Ailamaki, A. (2016). Transformers: Robust spatial joins on non-uniform data distributions. In Data Engineering (ICDE), 2016 IEEE 32nd International Conference on (pp. 673–684). IEEE. Retrieved from https://infoscience.epfl.ch/record/218595/files/ICDE16_research_179.pdf
Pavlovic, M., Zacharatou, E. T., Sidlauskas, D., Heinis, T., & Ailamaki, A. (2016). Space odyssey: efficient exploration of scientific data. ExploreDB@SIGMOD/PODS, 12–18. http://doi.org/10.1145/2948674.2948677
Perera, C., Wakenshaw, S. Y. L., Baarslag, T., Haddadi, H., Bandara, A. K., Mortier, R., … Crowcroft, J. (2016). Valorising the IoT Databox: creating value for everyone. Transactions on Emerging Telecommunications Technologies, 28(1), e3125. http://doi.org/10.1002/ett.3125
Pschetz, L., Tallyn, E., Gianni, R., & Speed, C. (2017). Bitbarista: Exploring Perceptions of Data Transactions in the Internet of Things. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 2964–2975). ACM. Retrieved from https://www.research.ed.ac.uk/portal/files/30037134/Submitted.pdf
Radanliev, P., De Roure, D. C., Nicolescu, R., Huth, M., Montalvo, R. M., Cannady, S., & Burnap, P. (2018). Future developments in cyber risk assessment for the internet of things. Computers in Industry, 102, 14–22. http://doi.org/https://doi.org/10.1016/j.compind.2018.08.002
Ravì, D., Wong, C., Deligianni, F., Berthelot, M., Andreu-Perez, J., Lo, B., & Yang, G. (2017). Deep Learning for Health Informatics. IEEE Journal of Biomedical and Health Informatics, 21(1), 4–21. http://doi.org/10.1109/JBHI.2016.2636665
Ravi, D., Wong, C., Lo, B., & Yang, G.-Z. (2017). A deep learning approach to on-node sensor data analytics for mobile or wearable devices. IEEE Journal of Biomedical and Health Informatics, 21(1), 56–64. Retrieved from http://discovery.ucl.ac.uk/10041080/1/Ravi.Deep Learning Approach.pdf
Rosa, B. M. G., & Yang, G. Z. (2016). Active implantable sensor powered by ultrasounds with application in the monitoring of physiological parameters for soft tissues. In Wearable and Implantable Body Sensor Networks (BSN), 2016 IEEE 13th International Conference on (pp. 318–323). IEEE. Retrieved from https://spiral.imperial.ac.uk/bitstream/10044/1/43464/2/BSN_paper_active_ultrasound_sensing_Bruno.pdf
Safa, N. S., Maple, C., Watson, T., & Von Solms, R. (2018). Motivation and opportunity based model to reduce information security insider threats in organisations. Journal of Information Security and Applications, 40, 247–257. http://doi.org/https://doi.org/10.1016/j.jisa.2017.11.001
Seymour, W. (2018). How Loyal is Your Alexa?: Imagining a Respectful Smart Assistant. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (p. SRC20:1–SRC20:6). New York, NY, USA: ACM. http://doi.org/10.1145/3170427.3180289
Smart, P., Madaan, A., & Hall, W. (2018). Where the smart things are: social machines and the Internet of Things. Phenomenology and the Cognitive Sciences. http://doi.org/10.1007/s11097-018-9583-x
Speed, C., Maxwell, D., & Pschetz, L. (2017). Data and the City: Blockchain City: Economic, social and cognitive ledgers (1st ed.). Routledge. Retrieved from https://www.routledge.com/Data-and-the-City/Kitchin-Lauriault-McArdle/p/book/9781138222632
Speed, C., & Oberlander, J. (2017). Centre for Design Informatics. Interactions, 24(2), 18–21. http://doi.org/10.1145/3047400
Stead, M., & Coulton, P. (2017). Old, Sick And No Health Insurance.: Will You Need A Permit To Use Your Home-made Health Wearable? In Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems (pp. 101–105). New York, NY, USA: ACM. http://doi.org/10.1145/3064857.3079127
Stead, M., Coulton, P., & Lindley, J. (2018). Do-It-Yourself Medical Devices: Exploring Their Potential Futures Through Design Fiction.
Stringhini, G., Shen, Y., Han, Y., & Zhang, X. (2017). Marmite: Spreading Malicious File Reputation Through Download Graphs. In Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 91–102). New York, NY, USA: ACM. http://doi.org/10.1145/3134600.3134604
Sun, Y., Wong, C., Yang, G., & Lo, B. (2017). Secure key generation using gait features for Body Sensor Networks. In 2017 IEEE 14th International Conference on Wearable and Implantable Body Sensor Networks (BSN) (pp. 206–210). http://doi.org/10.1109/BSN.2017.7936042
Taddeo, M. (2017). Trusting Digital Technologies Correctly. Minds and Machines, 27(4), 565–568. http://doi.org/10.1007/s11023-017-9450-5
Taddeo, M. (2017). Data Philanthropy and Individual Rights. Minds and Machines, 27(1), 1–5. http://doi.org/10.1007/s11023-017-9429-2
Taddeo, M. (2016). Data philanthropy and the design of the infraethics for information societies. Phil. Trans. R. Soc. A, 374(2083), 20160113. Retrieved from http://rsta.royalsocietypublishing.org/content/374/2083/20160113
Tallyn, E., Fried, H., Gianni, R., Isard, A., & Speed, C. (2018). The Ethnobot: Gathering Ethnographies in the Age of IoT. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (p. 604:1–604:13). New York, NY, USA: ACM. http://doi.org/10.1145/3173574.3174178
Tanczer, L. M., Steenmans, I., Elsden, M., Blackstock, J., & Carr, M. (2018). Emerging risks in the IoT ecosystem: Who’s afraid of the big bad smart fridge? Retrieved from http://discovery.ucl.ac.uk/10050092/1/Tanczer_et_al_Emerging_risks.pdf
Tanczer, L., Blythe, J., Yahya, F., Brass, I., Elsden, M., Blackstock, J., & Carr, M. (2018). DCMS Secure by Design:Literature Review of Industry Recommendations and International Developments on Iot Security. London. Retrieved from https://www.gov.uk/government/publications/secure-by-design
Tanczer, L., Carr, M., Brass, I., Steenmans, I., & Blackstock, J. J. (2017). IoT and Its Implications for Informed Consent. London. Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3117293
Tinati, R., Madaan, A., & Hall, W. (2017). The Role of Crowdsourcing in the Emerging Internet-Of-Things. In Proceedings of the 26th International Conference on World Wide Web Companion (pp. 1669–1672). Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee. http://doi.org/10.1145/3041021.3051693
Tiropanis, T. (2018). Observing Data in IoT Worlds: What and How to Observe? IET Conference Proceedings, 32 (7 pp.)-32 (7 pp.)(1). Retrieved from http://digital-library.theiet.org/content/conferences/10.1049/cp.2018.0032
Tomić, I., & McCann, J. A. (2017). A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4(6), 1910–1923. Retrieved from https://spiral.imperial.ac.uk/bitstream/10044/1/53004/6/FINAL VERSION.PDF.pdf
Trotter, L., Harding, M., Mikusz, M., & Davies, N. (2018). IoT-Enabled Highway Maintenance: Understanding Emerging Cybersecurity Threats. IEEE Pervasive Computing, 17(3), 23–34. http://doi.org/10.1109/MPRV.2018.03367732
Turner, H. C. M., Chizari, H., & Lupu, E. (2018). Step intervals and arterial pressure in PVS schemes. IET Conference Publications, 2018(CP740), 36 (10 pp.)-36 (10 pp.)(1). http://doi.org/10.1093/ntr/ntq246
Ullah, F., Edwards, M., Ramdhany, R., Chitchyan, R., Babar, M. A., & Rashid, A. (2018). Data exfiltration: A review of external attack vectors and countermeasures. Journal of Network and Computer Applications, 101, 18–54. http://doi.org/https://doi.org/10.1016/j.jnca.2017.10.016
Van Kleek, M., Binns, R., Zhao, J., Slack, A., Lee, S., Ottewell, D., & Shadbolt, N. (2018). X-Ray Refine: Supporting the Exploration and Refinement of Information Exposure Resulting from Smartphone Apps. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (p. 393:1–393:13). New York, NY, USA: ACM. http://doi.org/10.1145/3173574.3173967
Van Kleek, M., Seymour, W., Veale, M., Binns, R., & Shadbolt, N. (2018). The Need for Sensemaking in Networked Privacy and Algorithmic Responsibility. In Sensemaking in a Senseless World: Workshop at ACM CHI’18, 22 April 2018, Montréal, Canada. ACM Conference on Human Factors in Computing Systems (CHI’18). Retrieved from http://discovery.ucl.ac.uk/10046886/
Veale, M., Binns, R., & Ausloos, J. (2018). When data protection by design and data subject rights clash. International Data Privacy Law.
Veale, M., Binns, R., & Van Kleek, M. (2018). Some HCI Priorities for GDPR-Compliant Machine Learning.
Wachter, S. (2018). Ethical and normative challenges of identification in the Internet of Things. IET Conference Proceedings, 13 (10 pp.)-13 (10 pp.)(1). Retrieved from http://digital-library.theiet.org/content/conferences/10.1049/cp.2018.0013
Wachter, S. (2018). GDPR and the Internet of Things: Guidelines to Protect Users’ Identity and Privacy. Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3130392
Wachter, S. (2018). Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR. Computer Law & Security Review, 34(3), 436–449. http://doi.org/https://doi.org/10.1016/j.clsr.2018.02.002
Wachter, S., Mittelstadt, B., & Floridi, L. (2017). Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation. International Data Privacy Law, 7(2), 76–99. Retrieved from http://dx.doi.org/10.1093/idpl/ipx005
Wakenshaw, S. Y. L., Maple, C., Schraefel, M., Gomer, R., & Ghirardello, K. (2018). Mechanisms for Meaningful Consent in Internet of Things. Living in the Internet of Things: Cybersecurity of the IoT – 2018, 14 (10 pp.)-14 (10 pp.)(1). http://doi.org/10.1049/cp.2018.0014
Wakenshaw, S. Y. L., Dhamotharan, L., Ignatius, J., Ng, I. C. L., Ma, X., Chen, D., & Maple, C. (2017). Privacy, vulnerability, and willingness to share : an empirical investigation using latent growth curve model. In Data for Policy Conference. Retrieved from http://wrap.warwick.ac.uk/93828/
Wakenshaw, S. Y. L., Masi, D., Micillo, R., Godsell, J., & Maple, C. (2017). The Internet of Things? potential to achieve supply chain integration : a case study. In 21st Annual CIM Symposium – Globalisation 2.0. Retrieved from http://wrap.warwick.ac.uk/93833/
Wang, X., Madaan, A., Siow, E., & Tiropanis, T. (2017). Sharing Databases on the Web with Porter Proxy. In Proceedings of the 26th International Conference on World Wide Web Companion (pp. 1673–1676). Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee. http://doi.org/10.1145/3041021.3051694
Weissbacher, M., Mariconti, E., Suarez-Tangil, G., Stringhini, G., Robertson, W., & Kirda, E. (2017). Ex-Ray: Detection of History-Leaking Browser Extensions. In Proceedings of the 33rd Annual Computer Security Applications Conference (pp. 590–602). New York, NY, USA: ACM. http://doi.org/10.1145/3134600.3134632
Xiang, W., Zheng, K., & Shen, X. S. (2016). 5G mobile communications. Springer. Retrieved from https://link.springer.com/book/10.1007%2F978-3-319-34208-5
Yang, G.-Z. (2018). Implantable Sensors and Systems: From Theory to Practice. Springer. Retrieved from https://link.springer.com/book/10.1007%2F978-3-319-69748-2
Yuan, H., Maple, C., Chen, C., & Watson, T. (2018). Cross-device tracking through identification of user typing behaviours. Electronics Letters, 54(15), 957–959. http://doi.org/10.1049/el.2018.0893
Yuan, H., Maple, C., & Ghirardello, K. (2018). Dynamic Route Selection for Vehicular Store-Carry-Forward Networks and Misbehaviour Vehicles Analysis. Retrieved from https://core.ac.uk/download/pdf/159768447.pdf
Yuan, H., Maple, C., Lu, Y., & Watson, T. (2018). Peer-assisted location authentication and access control for wireless networks. Internet Technology Letters, 0(0), e71. http://doi.org/10.1002/itl2.71
Zhao, C., Yang, S., Yang, X., & McCann, J. A. (2017). Rapid, User-Transparent, and Trustworthy Device Pairing for D2D-Enabled Mobile Crowdsourcing. IEEE Transactions on Mobile Computing, 16(7), 2008–2022. http://doi.org/10.1109/TMC.2016.2611575
1 note
·
View note