{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T16:40:50Z","timestamp":1761064850135,"version":"build-2065373602"},"reference-count":10,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":296,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["asistdl.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Proc. Assoc. Info. Sci. Tech."],"published-print":{"date-parts":[[2017,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>As wearable devices continue to rise in popularity and become more embedded in our lives, there is a growing need for better information privacy policies protecting users' privacy and education raising users' awareness for such privacy\u2010invasive technologies. This panel is an exploration of the interplay between privacy policies and user behavior. The panel will address (1) current privacy policies for wearable devices, (2) how users' perceptions of privacy affects their responses to these policies and use of wearable devices and (3) the potential gaps in users' understanding of how their personal information from such devices is collected, transmitted and stored for undefined future use. Panelists will discuss these concepts from the perspectives of law, psychology, information systems and digital literacy. This panel is intended to be interactive and will encourage the audience to discuss their own understandings of information privacy in the context of wearable devices. The panel aims to contribute in developing information science\u2010specific approaches to wearable device privacy policy and education and in making suggestions for future research.<\/jats:p>","DOI":"10.1002\/pra2.2017.14505401084","type":"journal-article","created":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T03:35:36Z","timestamp":1508816136000},"page":"603-605","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Wearable devices: Information privacy, policy and user behavior"],"prefix":"10.1002","volume":"54","author":[{"given":"Natalie Greene","family":"Taylor","sequence":"first","affiliation":[{"name":"University of South Florida USA"}]},{"given":"Loni","family":"Hagen","sequence":"additional","affiliation":[{"name":"University of South Florida USA"}]},{"given":"Ersin","family":"Dincelli","sequence":"additional","affiliation":[{"name":"University at Albany, SUNY USA"}]},{"given":"Kristene","family":"Unsworth","sequence":"additional","affiliation":[{"name":"Stockton University USA"}]}],"member":"311","published-online":{"date-parts":[[2017,10,24]]},"reference":[{"volume-title":"Many smartphone owners don't take steps to secure their devices","year":"2017","author":"Anderson M.","key":"e_1_2_5_2_1"},{"key":"e_1_2_5_3_1","unstructured":"Cha A.E.(2015 May 9). The revolution will be digitized.Washington Post. Retrieved April 25 fromwww.washing-tonpost.com\/sf\/national\/2015\/05\/09\/the-revolution-will-be-digitized\/?utm_term=.e6f335c12869"},{"key":"e_1_2_5_4_1","unstructured":"CSI Insight. (2016).Wearables momentum continues. Retrieved April 30 fromwww.ccsinsight.com\/press\/company-news\/2516-wearables-momentum-continues"},{"key":"e_1_2_5_5_1","unstructured":"Dincelli E. &Zhou X.(2017).Examining self\u2010disclosure on wearable devices: The roles of benefit structure and privacy calculus.Proceedings of 23rd Americas Conference on Information Systems 2017. Boston MA."},{"key":"e_1_2_5_6_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"e_1_2_5_7_1","first-page":"6","article-title":"Every breath you take: Data privacy and your wearable fitness device","volume":"72","author":"Kellogg S.","year":"2016","journal-title":"J. Mo. B"},{"key":"e_1_2_5_8_1","unstructured":"Montgomery K.C. Chester J. &Kopp K.(2016). Health wearable devices in the big data era: Ensuring privacy security and consumer protection.Center for Digital Democracy American University. Retrieved April 9 fromwww.democraticme-dia.org\/sites\/default\/files\/field\/public\/2016\/aucdd_weara-blesreport_final121516.pdf"},{"volume-title":"Boundaries of privacy","year":"2002","author":"Petronio S.","key":"e_1_2_5_9_1"},{"key":"e_1_2_5_10_1","doi-asserted-by":"crossref","unstructured":"Raij A. Ghosh A. Kumar S. &Srivastava M.(2011 May).Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. InProceedings of the SIGCHI Conference on Human Factors in Computing Systems(pp.11\u201320). Vancouver BC Canada.","DOI":"10.1145\/1978942.1978945"},{"key":"e_1_2_5_11_1","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v4i3.515"}],"container-title":["Proceedings of the Association for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2017.14505401084","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2017.14505401084","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/pra2.2017.14505401084","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2017.14505401084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T16:21:25Z","timestamp":1761063685000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/pra2.2017.14505401084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["10.1002\/pra2.2017.14505401084"],"URL":"https:\/\/doi.org\/10.1002\/pra2.2017.14505401084","archive":["Portico"],"relation":{},"ISSN":["2373-9231","2373-9231"],"issn-type":[{"type":"print","value":"2373-9231"},{"type":"electronic","value":"2373-9231"}],"subject":[],"published":{"date-parts":[[2017,1]]},"assertion":[{"value":"2017-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}