{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T08:42:26Z","timestamp":1774687346842,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030053444","type":"print"},{"value":"9783030053451","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_27","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T14:07:56Z","timestamp":1544191676000},"page":"319-330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Towards New Privacy Regulations in Europe: Users\u2019 Privacy Perception in Recommender Systems"],"prefix":"10.1007","author":[{"given":"Itishree","family":"Mohallick","sequence":"first","affiliation":[]},{"given":"Katrien","family":"De Moor","sequence":"additional","affiliation":[]},{"given":"\u00d6zlem","family":"\u00d6zg\u00f6bek","sequence":"additional","affiliation":[]},{"given":"Jon Atle","family":"Gulla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Ackerman, M.S., Cranor, L.F., Reagle, J.: Privacy in e-commerce: examining user scenarios and privacy preferences. In: Proceedings of the 1st ACM Conference on Electronic Commerce, pp. 1\u20138. ACM (1999)","DOI":"10.1145\/336992.336995"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Adams, A.: Users\u2019 perception of privacy in multimedia communication. In: Extended Abstracts on Human Factors in Computing Systems, CHI 1999, pp. 53\u201354. ACM (1999)","DOI":"10.1145\/632716.632752"},{"issue":"1","key":"27_CR3","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MSP.2010.38","volume":"8","author":"AI Ant\u00f3n","year":"2010","unstructured":"Ant\u00f3n, A.I., Earp, J.B., Young, J.D.: How internet users\u2019 privacy concerns have evolved since 2002. IEEE Secur. Priv. 8(1), 21\u201327 (2010). https:\/\/doi.org\/10.1109\/MSP.2010.38 . ISSN: 1540-7993","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"27_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.2307\/25148715","volume":"30","author":"NF Awad","year":"2006","unstructured":"Awad, N.F., Krishnan, M.S.: The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Q. 30(1), 13\u201328 (2006). http:\/\/www.jstor.org\/stable\/25148715","journal-title":"MIS Q."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Barnes, S.B.: A privacy paradox: social networking in the United States. First Monday 11(9) (2006). http:\/\/journals.uic.edu\/ojs\/index.php\/fm\/article\/view\/1394","DOI":"10.5210\/fm.v11i9.1394"},{"issue":"2","key":"27_CR6","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s12394-010-0054-y","volume":"3","author":"A Cavoukian","year":"2010","unstructured":"Cavoukian, A., Fisher, A., Killen, S., Hoffman, D.A.: Remote home health care technologies: how to ensure privacy? Build it in: privacy by design. Identity Inf. Soc. 3(2), 363\u2013378 (2010)","journal-title":"Identity Inf. Soc."},{"issue":"2\u20133","key":"27_CR7","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10799-005-5879-y","volume":"6","author":"RK Chellappa","year":"2005","unstructured":"Chellappa, R.K., Sin, R.G.: Personalization versus privacy: an empirical examination of the online consumers dilemma. Inf. Tech. Manag. 6(2\u20133), 181\u2013202 (2005)","journal-title":"Inf. Tech. Manag."},{"key":"27_CR8","unstructured":"European Commission: Attitudes on data protection and electronic identity in the European Union, June 2011. http:\/\/ec.europa.eu\/commfrontoffice\/publicopinion\/archives\/ebs\/ebs_359_en.pdf"},{"key":"27_CR9","unstructured":"European Commission: 2018 reform EU data protection rules, May 2018. https:\/\/ec.europa.eu\/commission\/priorities\/justice-and-fundamental-rights\/data-protection\/2018-reform-eu-data-protection-rules_en"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Cranor, L.F., Reagle, J., Ackerman, M.S.: Beyond concern: understanding net users attitudes about online privacy. In: The Internet Upheaval: Raising Questions, Seeking Answers in Communications Policy, pp. 47\u201370 (2000)","DOI":"10.7551\/mitpress\/3874.003.0008"},{"key":"27_CR11","unstructured":"Fox, S., Rainie, L., Horrigan, J., Lenhart, A., Spooner, T., Carter, C.: Trust and privacy online: why Americans want to rewrite the rules. The Pew Internet and American Life Project, pp. 1\u201329 (2000)"},{"key":"27_CR12","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985451","volume-title":"Practical Sampling","author":"GT Henry","year":"1990","unstructured":"Henry, G.T.: Practical Sampling, vol. 21. Sage, Thousand Oaks (1990)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Knijnenburg, B.P., Berkovsky, S.: Privacy for recommender systems: tutorial abstract. In: Proceedings of the Eleventh ACM Conference on Recommender Systems, pp. 394\u2013395. ACM (2017)","DOI":"10.1145\/3109859.3109935"},{"key":"27_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/3-540-44566-8_52","volume-title":"User Modeling 2001","author":"A Kobsa","year":"2001","unstructured":"Kobsa, A.: Tailoring privacy to users\u2019 needs1. In: Bauer, M., Gmytrasiewicz, P.J., Vassileva, J. (eds.) UM 2001. LNCS (LNAI), vol. 2109, pp. 301\u2013313. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44566-8_52"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? Privacy preference determinants in ubiquitous computing. In: Extended Abstracts on Human Factors in Computing Systems, CHI 2003, pp. 724\u2013725. ACM (2003)","DOI":"10.1145\/765891.765952"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Mohallick, I., \u00d6zg\u00f6bek, \u00d6.: Exploring privacy concerns in news recommender systems. In: Proceedings of the International Conference on Web Intelligence, pp. 1054\u20131061. ACM (2017)","DOI":"10.1145\/3106426.3109435"},{"key":"27_CR17","unstructured":"Mohallick, I., \u00d6zg\u00f6bek, \u00d6.: A survey on Norwegian user perspective on privacy in recommender systems. In: Proceedings of the 3rd Norwegian Big Data Symposium (NOBIDS 2017) in Conjunction with NxtMedia Conference 2017. CEUR Workshop Proceedings (2017)"},{"key":"27_CR18","volume-title":"Researching Information Systems and Computing","author":"BJ Oates","year":"2006","unstructured":"Oates, B.J.: Researching Information Systems and Computing. Sage Publications Ltd., Thousand Oaks (2006)"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Olson, J., Grudin, J., Horvitz, E.: Toward understanding preferences for sharing and privacy. In: Proceedings of the CHI (2004)","DOI":"10.1145\/1056808.1057073"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Olson, J.S., Grudin, J., Horvitz, E.: A study of preferences for sharing and privacy. In: Extended Abstracts on Human Factors in Computing Systems, CHI 2005, pp. 1985\u20131988. ACM (2005)","DOI":"10.1145\/1056808.1057073"},{"key":"27_CR21","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-03315-5_17","volume-title":"The Future of Identity in the Information Society","author":"S P\u00f6tzsch","year":"2009","unstructured":"P\u00f6tzsch, S.: Privacy awareness: a means to solve the privacy paradox? In: Maty\u00e1\u0161, V., Fischer-H\u00fcbner, S., Cvr\u010dek, D., \u0160venda, P. (eds.) Privacy and Identity 2008. IAICT, vol. 298, pp. 226\u2013236. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03315-5_17"},{"issue":"3","key":"27_CR22","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s10660-009-9036-2","volume":"9","author":"DG Taylor","year":"2009","unstructured":"Taylor, D.G., Davis, D.F., Jillapalli, R.: Privacy concern and online personalization: the moderating effects of information control and compensation. Electron. Commer. Res. 9(3), 203\u2013223 (2009)","journal-title":"Electron. Commer. Res."},{"issue":"1\u20132","key":"27_CR23","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s11257-011-9110-z","volume":"22","author":"E Toch","year":"2012","unstructured":"Toch, E., Wang, Y., Cranor, L.F.: Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Model. User-Adap. Interact. 22(1\u20132), 203\u2013220 (2012)","journal-title":"User Model. User-Adap. Interact."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T03:49:11Z","timestamp":1720842551000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}