{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:58:59Z","timestamp":1743112739873,"version":"3.40.3"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030134716"},{"type":"electronic","value":"9783030134723"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-13472-3_4","type":"book-chapter","created":{"date-parts":[[2019,2,19]],"date-time":"2019-02-19T02:56:10Z","timestamp":1550544970000},"page":"33-49","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy Literacy and the Everyday Use of Social Technologies"],"prefix":"10.1007","author":[{"given":"Zablon","family":"Pingo","sequence":"first","affiliation":[]},{"given":"Bhuva","family":"Narayan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,20]]},"reference":[{"key":"4_CR1","unstructured":"Clarke, R.: Introduction to Dataveillance and Information Privacy, and Definitions of Terms (1999). http:\/\/www.rogerclarke.com\/DV\/Intro.html"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/1735223.1735243","volume":"53","author":"AJ Sellen","year":"2010","unstructured":"Sellen, A.J., Whittaker, S.: Beyond total capture: a constructive critique of lifelogging. Commun. ACM 53, 70\u201377 (2010)","journal-title":"Commun. ACM"},{"key":"4_CR3","volume-title":"The Quantified Self","author":"D Lupton","year":"2016","unstructured":"Lupton, D.: The Quantified Self. Polity Press, Malden (2016)"},{"key":"4_CR4","unstructured":"Kobsa, A.: Pseudonymous yet personalized interaction with websites that utilize network-wide user modeling services. In: HCIC Winter Workshop, Winter Park, CO (2003)"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1177\/0340035216662890","volume":"42","author":"S Garcia-Rivadulla","year":"2016","unstructured":"Garcia-Rivadulla, S.: Personalization vs. privacy. IFLA J. 42, 227\u2013238 (2016)","journal-title":"IFLA J."},{"key":"4_CR6","doi-asserted-by":"publisher","DOI":"10.1057\/9781137513960","volume-title":"A Cyber Age Privacy Doctrine: Policy and Practice","author":"A Etzioni","year":"2015","unstructured":"Etzioni, A.: A Cyber Age Privacy Doctrine: Policy and Practice. Polgrave Macmillan, New York (2015)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Correia, J., Compeau, D.: Information privacy awareness (IPA): a review of the use, definition and measurement of IPA. In: Proceedings of the 50th Hawaii International Conference on System Sciences, Hawaii (2017)","DOI":"10.24251\/HICSS.2017.486"},{"key":"4_CR8","unstructured":"Rotman, D.: Are you looking at me? Social media and privacy literacy. In: Poster in the 4th iSchool Conference, Chapel Hill, USA (2009)"},{"key":"4_CR9","doi-asserted-by":"crossref","first-page":"704","DOI":"10.29302\/oeconomica.2012.14.2.36","volume":"14","author":"C Veghes","year":"2012","unstructured":"Veghes, C., Orzan, M., Acatrinei, C., Dugulan, D.: Privacy literacy: what is and how it can be measured? Ann. Univ. Apulensis Ser. Oeconomica 14, 704 (2012)","journal-title":"Ann. Univ. Apulensis Ser. Oeconomica"},{"key":"4_CR10","volume-title":"Information Privacy Fundamentals for Librarians and Information Professionals","author":"CL Givens","year":"2015","unstructured":"Givens, C.L.: Information Privacy Fundamentals for Librarians and Information Professionals. Rowman & Littlefield, Lanham (2015)"},{"key":"4_CR11","unstructured":"Rainie, L., Duggan, M.: Privacy and Information Sharing. Pew Research Center (2016). http:\/\/www.pewinternet.org\/2016\/01\/14\/2016\/Privacy-and-Information-Sharing\/"},{"key":"4_CR12","first-page":"1","volume":"16","author":"C Veghes","year":"2014","unstructured":"Veghes, C., Popescu, I.C., Orzan, M., Acatrinei, C.: Mapping the private space of the romanian consumer: micro and macroeconomic implications. Ann. Univ. Apulensis Ser. Oeconomica 16, 1 (2014)","journal-title":"Ann. Univ. Apulensis Ser. Oeconomica"},{"key":"4_CR13","first-page":"32","volume":"21","author":"CL Smith","year":"2016","unstructured":"Smith, C.L.: Privacy and trust attitudes in the intent to volunteer for data-tracking research. Inf. Res.: Int. Electron. J. 21, 32 (2016)","journal-title":"Inf. Res.: Int. Electron. J."},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Conference on Electronic Commerce, pp. 21\u201329. ACM (2004)","DOI":"10.1145\/988772.988777"},{"key":"4_CR15","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of Privacy: Dialectic of Disclosure","author":"S Petronio","year":"2002","unstructured":"Petronio, S.: Boundaries of Privacy: Dialectic of Disclosure. State University of New York Press, Albany (2002)"},{"key":"4_CR16","unstructured":"Office of the Australian Information Commissioner: Australian Community Attitudes to Privacy Survey (2017)"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1177\/0093650211418338","volume":"40","author":"YJ Park","year":"2013","unstructured":"Park, Y.J.: Digital literacy and privacy behavior online. Commun. Res. 40, 215\u2013236 (2013)","journal-title":"Commun. Res."},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.clsr.2009.11.006","volume":"26","author":"D Svantesson","year":"2010","unstructured":"Svantesson, D., Clarke, R.: A best practice model for e-consumer protection. Comput. Law Secur. Rev. 26, 31\u201337 (2010)","journal-title":"Comput. Law Secur. Rev."},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Fornaciari, F.: Pricey privacy: framing the economy of information in the digital age. First Monday 19 (2014)","DOI":"10.5210\/fm.v19i12.5008"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0272-4944(95)90018-7","volume":"15","author":"PB Newell","year":"1995","unstructured":"Newell, P.B.: Perspectives on privacy. J. Environ. Psychol. 15, 87\u2013104 (1995)","journal-title":"J. Environ. Psychol."},{"issue":"5","key":"4_CR21","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S Warren","year":"1890","unstructured":"Warren, S., Brandeis, L.: The right to privacy. Havard Law Rev. 4(5), 193\u2013220 (1890)","journal-title":"Havard Law Rev."},{"key":"4_CR22","volume-title":"Privacy and Freedom","author":"AF Westin","year":"1967","unstructured":"Westin, A.F.: Privacy and Freedom. Athenaeum, New York (1967)"},{"key":"4_CR23","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.2307\/1229519","volume":"52","author":"AM Froomkin","year":"2000","unstructured":"Froomkin, A.M.: The death of privacy? Stanford Law Rev. 52, 1461\u20131543 (2000)","journal-title":"Stanford Law Rev."},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1108\/AJIM-07-2014-0087","volume":"67","author":"D Haynes","year":"2015","unstructured":"Haynes, D., Robinson, L.: Defining user risk in social networking services. Aslib J. Inf. Manag. 67, 94\u2013115 (2015)","journal-title":"Aslib J. Inf. Manag."},{"key":"4_CR25","volume-title":"Networks of Control: a Report on Corporate Surveillance, Digital Tracking, Big Data & Privacy","author":"W Christl","year":"2016","unstructured":"Christl, W., Spiekerman, S.: Networks of Control: a Report on Corporate Surveillance, Digital Tracking, Big Data & Privacy. Facultas, Vienna (2016)"},{"key":"4_CR26","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1207\/s15506878jobem4903_1","volume":"49","author":"Z Papacharissi","year":"2005","unstructured":"Papacharissi, Z., Fernback, J.: Online privacy and consumer protection: an analysis of portal privacy statements. J. Broadcast. Electron. Media 49, 259\u2013281 (2005)","journal-title":"J. Broadcast. Electron. Media"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Bandara, R., Fernando, M., Akter, S.: Is the privacy paradox a matter of psychological distance? An exploratory study of the privacy paradox from a construal level theory perspective. In: Proceedings of the 51st Hawaii International Conference on System Sciences, Hawaii (2018)","DOI":"10.24251\/HICSS.2018.465"},{"key":"4_CR28","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10676-006-9121-3","volume":"8","author":"L Floridi","year":"2006","unstructured":"Floridi, L.: Four challenges for a theory of informational privacy. Ethics Inf. Technol. 8, 109\u2013119 (2006)","journal-title":"Ethics Inf. Technol."},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Barnes, S.B.: A privacy paradox: social networking in the United States. First Monday 11 (2006)","DOI":"10.5210\/fm.v11i9.1394"},{"key":"4_CR30","volume-title":"The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding","author":"I Altman","year":"1975","unstructured":"Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks\/Cole, Monterey (1975)"},{"key":"4_CR31","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1111\/j.1540-4560.1977.tb01883.x","volume":"33","author":"I Altman","year":"1977","unstructured":"Altman, I.: Privacy regulation: culturally universal or culturally specific? J. Soc. Issues 33, 66\u201384 (1977)","journal-title":"J. Soc. Issues"},{"key":"4_CR32","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","author":"S Petronio","year":"2012","unstructured":"Petronio, S.: Boundaries of Privacy: Dialectics of Disclosure. Suny Press, Albany (2012)"},{"key":"4_CR33","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1111\/j.1083-6101.2007.00328.x","volume":"12","author":"MJ Metzger","year":"2007","unstructured":"Metzger, M.J.: Communication privacy management in electronic commerce. J. Comput.-Med. Commun. 12, 335\u2013361 (2007)","journal-title":"J. Comput.-Med. Commun."},{"key":"4_CR34","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1108\/AJIM-12-2016-0208","volume":"69","author":"AM Cox","year":"2017","unstructured":"Cox, A.M., McKinney, P., Goodale, P.: Food logging: an information literacy perspective. Aslib J. Inf. Manag. 69, 184\u2013200 (2017)","journal-title":"Aslib J. Inf. Manag."},{"key":"4_CR35","doi-asserted-by":"publisher","first-page":"7","DOI":"10.2753\/JEC1086-4415100201","volume":"10","author":"T Dinev","year":"2005","unstructured":"Dinev, T., Hart, P.: Internet privacy concerns and social awareness as determinants of intention to transact. Int. J. Electron. Commer. 10, 7\u201329 (2005)","journal-title":"Int. J. Electron. Commer."},{"key":"4_CR36","unstructured":"ALA Digital Technology Taskforce: What is Digital Literacy? (2011)"},{"key":"4_CR37","unstructured":"Boyd, D.: Why youth (heart) social network sites: the role of networked publics in teenage social life. In: Buckingham, D. (ed.) Macarthur Foundation Series on Digital Learning\u2013Youth, Identity, and Digital Media Volume, pp. 119\u2013142. MIT Press, Cambridge (2007)"},{"key":"4_CR38","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1177\/1461444814543995","volume":"16","author":"AE Marwick","year":"2014","unstructured":"Marwick, A.E., Boyd, D.: Networked privacy: how teenagers negotiate context in social media. New Media Soc. 16, 1051\u20131067 (2014)","journal-title":"New Media Soc."},{"key":"4_CR39","unstructured":"Rappa, M.: Business Models on the Web (2003). http:\/\/digitalenterprise.org"},{"key":"4_CR40","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.chb.2014.05.041","volume":"38","author":"YJ Park","year":"2014","unstructured":"Park, Y.J., Jang, S.M.: Understanding privacy knowledge and skill in mobile communication. Comput. Hum. Behav. 38, 296\u2013303 (2014)","journal-title":"Comput. Hum. Behav."},{"key":"4_CR41","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-531-90519-8_7","volume-title":"Grenzenlose Cyberwelt","author":"E Hargittai","year":"2007","unstructured":"Hargittai, E.: A framework for studying differences in people\u2019s digital media uses. In: Kompetenzzentrum Informelle Bildung (ed.) Grenzenlose Cyberwelt, pp. 121\u2013136. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-531-90519-8_7"},{"key":"4_CR42","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.lisr.2015.04.007","volume":"37","author":"B Stvilia","year":"2015","unstructured":"Stvilia, B., Choi, W.: Mobile wellness application-seeking behavior by college students: an exploratory study. Libr. Inf. Sci. Res. 37, 201\u2013208 (2015)","journal-title":"Libr. Inf. Sci. Res."},{"key":"4_CR43","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.bushor.2011.06.002","volume":"54","author":"L Christiansen","year":"2011","unstructured":"Christiansen, L.: Personal privacy and internet marketing: an impossible conflict or a marriage made in heaven? Bus. Horiz. 54, 509\u2013514 (2011)","journal-title":"Bus. Horiz."},{"key":"4_CR44","volume-title":"Research Methods: Information, Systems and Contexts","author":"K Williamson","year":"2013","unstructured":"Williamson, K., Johanson, G.: Research Methods: Information, Systems and Contexts. Tilde Publishing, Australia (2013)"},{"key":"4_CR45","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3, 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"key":"4_CR46","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226584546.001.0001","volume-title":"Islands of Privacy","author":"CE Nippert-Eng","year":"2010","unstructured":"Nippert-Eng, C.E.: Islands of Privacy. University of Chicago Press, Chicago (2010)"},{"key":"4_CR47","doi-asserted-by":"publisher","unstructured":"Ryan, F.V.C., Cruickshank, P., Hall, H., Lawson, A.: Blurred reputations: managing professional and private information online. J. Librarianship Inf. Sci. (2017). https:\/\/doi.org\/10.1177\/0961000618769977","DOI":"10.1177\/0961000618769977"},{"key":"4_CR48","unstructured":"Madden, M., Smith, A.: Reputation Management and Social Media. Pew Internet & American Life Project (2010)"},{"key":"4_CR49","unstructured":"Ryan, F.V., Cruickshank, P., Hall, H., Lawson, A.: Managing and evaluating personal reputations on the basis of information shared on social media: a generation x perspective. Inf. Res.-Int. Electron. J. 21 (2016)"},{"key":"4_CR50","doi-asserted-by":"crossref","unstructured":"Xia, H., Wang, Y., Huang, Y., Shah, A.: \u201cOur privacy needs to be protected at all costs\u201d: crowd workers\u2019 privacy experiences on amazon mechanical turk. ACM Hum.-Comput. Interact 1, 22 (2017)","DOI":"10.1145\/3134748"},{"key":"4_CR51","unstructured":"Urban, J.M., Hoofnagle, C.J.: The Privacy Pragmatic as Privacy Vulnerable. UC Berkeley Public Law Research Paper, no. 2514381 (2014)"}],"container-title":["Communications in Computer and Information Science","Information Literacy in Everyday Life"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-13472-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T19:16:14Z","timestamp":1694632574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-13472-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030134716","9783030134723"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-13472-3_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECIL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Information Literacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oulu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Finland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecil2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ecil2018.ilconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"ConfTool","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"241","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"58","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}