{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:16:57Z","timestamp":1761581817745,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030172862"},{"type":"electronic","value":"9783030172879"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-17287-9_9","type":"book-chapter","created":{"date-parts":[[2019,4,3]],"date-time":"2019-04-03T22:50:37Z","timestamp":1554331837000},"page":"103-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["\u201cI Am the Eye in the Sky \u2013 Can You Read My Mind?\u201d How to Address Public Concerns Towards Drone Use"],"prefix":"10.1007","author":[{"given":"Anne","family":"Oltvoort","sequence":"first","affiliation":[]},{"given":"Peter","family":"de Vries","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"van Rompay","sequence":"additional","affiliation":[]},{"given":"Dale","family":"Rosen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,3]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MSP.2018.3761721","volume":"16","author":"S Winkler","year":"2018","unstructured":"Winkler, S., Zeadally, S., Evans, K.: Privacy and civilian drone use: the need for further regulation. IEEE Secur. Priv. 16, 72\u201380 (2018)","journal-title":"IEEE Secur. Priv."},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-319-07127-5_8","volume-title":"Persuasive Technology","author":"P Vries de","year":"2014","unstructured":"de Vries, P., Galetzka, M., Gutteling, J.: Persuasion in the wild: communication, technology, and event safety. In: Spagnolli, A., Chittaro, L., Gamberini, L. (eds.) PERSUASIVE 2014. LNCS, vol. 8462, pp. 80\u201391. Springer, Cham (2014). \n                      https:\/\/doi.org\/10.1007\/978-3-319-07127-5_8"},{"key":"9_CR3","unstructured":"Jolly, J.: \u2018Never, ever try to shoot at a drone.\u2019 Neighborhoods buzz with complaints over pesky drones. USA Today (2018). \n                      https:\/\/eu.usatoday.com\/story\/tech\/columnist\/2018\/09\/03\/drone-gripes-mount-homeowners-complain-breached-privacy-annoyance\/1117085002\/"},{"key":"9_CR4","unstructured":"Witteman, J.: Wanneer schendt een drone uw privacy? De Volkskrant (2017). \n                      https:\/\/www.volkskrant.nl\/cultuur-media\/wanneer-schendt-een-drone-uw-privacy-~b91d9c53\/"},{"key":"9_CR5","unstructured":"Rahman, M.F.A.: Security Drones: is the Singapore Public Ready? (2016)"},{"key":"9_CR6","series-title":"Information Technology and Law Series","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-6265-132-6","volume-title":"The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives","year":"2016","unstructured":"Custers, B. (ed.): The Future of Drone Use: Opportunities and Threats from Ethical and Legal Perspectives. ITLS, vol. 27. T.M.C. Asser Press, The Hague (2016). \n                      https:\/\/doi.org\/10.1007\/978-94-6265-132-6"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1111\/j.1467-954X.2010.01930.x","volume":"58","author":"E Taylor","year":"2010","unstructured":"Taylor, E.: I spy with my little eye: the use of CCTV in schools and the impact on privacy. Sociol. Rev. 58, 381\u2013405 (2010)","journal-title":"Sociol. Rev."},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-319-20306-5_13","volume-title":"Persuasive Technology","author":"TJL Rompay Van","year":"2015","unstructured":"Van Rompay, T.J.L., De Vries, P.W., Damink, M.T.: \u201cFor your safety\u201d: effects of camera surveillance on safety impressions, situation construal and attributed intent. In: MacTavish, T., Basapur, S. (eds.) PERSUASIVE 2015. LNCS, vol. 9072, pp. 141\u2013146. Springer, Cham (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-319-20306-5_13"},{"key":"9_CR9","volume-title":"Transparency: How Leaders Create a Culture of Candor","author":"W Bennis","year":"2008","unstructured":"Bennis, W., Goleman, D., O\u2019Toole, J.: Transparency: How Leaders Create a Culture of Candor. Wiley, Hoboken (2008)"},{"key":"9_CR10","first-page":"7","volume":"7","author":"CJ Fombrun","year":"2000","unstructured":"Fombrun, C.J., Rindova, V.P.: The road to transparency: reputation management at Royal Dutch\/Shell. Expressive Organ. 7, 7\u201396 (2000)","journal-title":"Expressive Organ."},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1108\/02621710610708577","volume":"25","author":"J Jahansoozi","year":"2006","unstructured":"Jahansoozi, J.: Organization-stakeholder relationships: exploring trust and transparency. J. Manag. Dev. 25, 942\u2013955 (2006)","journal-title":"J. Manag. Dev."},{"key":"9_CR12","volume-title":"The Naked Corporation: How the Age of Transparency Will Revolutionize Business","author":"D Tapscott","year":"2003","unstructured":"Tapscott, D., Ticoll, D.: The Naked Corporation: How the Age of Transparency Will Revolutionize Business. Simon and Schuster, New York City (2003)"},{"key":"9_CR13","first-page":"89","volume":"34","author":"FO Walumbwa","year":"2008","unstructured":"Walumbwa, F.O., Avolio, B.J., Gardner, W.L., Wernsing, T.S., Peterson, S.J.: Authentic leadership: development and validation of a theory-based measure. J. Manag. 34, 89\u2013126 (2008)","journal-title":"J. Manag."},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"111","DOI":"10.2307\/248811","volume":"12","author":"A-MK Baronas","year":"1988","unstructured":"Baronas, A.-M.K., Louis, M.R.: Restoring a sense of control during implementation: how user involvement leads to system acceptance. MIS Q. 12, 111\u2013124 (1988)","journal-title":"MIS Q."},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1093\/rfs\/12.1.5","volume":"12","author":"R Bloomfield","year":"1999","unstructured":"Bloomfield, R., O\u2019Hara, M.: Market transparency: who wins and who loses? Rev. Financ. Stud. 12, 5\u201335 (1999)","journal-title":"Rev. Financ. Stud."},{"issue":"45","key":"9_CR16","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1177\/0021943608317520","volume":"1973","author":"C Clark Williams","year":"2008","unstructured":"Clark Williams, C.: Toward a taxonomy of corporate reporting strategies. J. Bus. Commun. 1973(45), 232\u2013264 (2008)","journal-title":"J. Bus. Commun."},{"key":"9_CR17","first-page":"1784","volume":"42","author":"AK Schnackenberg","year":"2016","unstructured":"Schnackenberg, A.K., Tomlinson, E.C.: Organizational transparency: a new perspective on managing trust in organization-stakeholder relationships. J. Manag. 42, 1784\u20131810 (2016)","journal-title":"J. Manag."},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D Gefen","year":"2003","unstructured":"Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in online shopping: an integrated model. MIS Q. 27, 51\u201390 (2003)","journal-title":"MIS Q."},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1287\/isre.1040.0015","volume":"15","author":"PA Pavlou","year":"2004","unstructured":"Pavlou, P.A., Gefen, D.: Building effective online marketplaces with institution-based trust. Inf. Syst. Res. 15, 37\u201359 (2004)","journal-title":"Inf. Syst. Res."},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"RC Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., Schoorman, F.D.: An integrative model of organizational trust. Acad. Manag. Rev. 20, 709\u2013734 (1995)","journal-title":"Acad. Manag. Rev."},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1037\/0022-3514.37.4.608","volume":"37","author":"RT Mills","year":"1979","unstructured":"Mills, R.T., Krantz, D.S.: Information, choice, and reactions to stress: a field experiment in a blood bank with laboratory analogue. J. Pers. Soc. Psychol. 37, 608 (1979)","journal-title":"J. Pers. Soc. Psychol."},{"key":"9_CR22","first-page":"1","volume":"2","author":"BR Rawlins","year":"2008","unstructured":"Rawlins, B.R.: Measuring the relationship between organizational transparency and employee trust. Public Relat. J. 2, 1\u201321 (2008)","journal-title":"Public Relat. J."},{"key":"9_CR23","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1080\/14768320500537639","volume":"21","author":"C Ouwehand","year":"2006","unstructured":"Ouwehand, C., De Ridder, D.T.D., Bensing, J.M.: Situational aspects are more important in shaping proactive coping behaviour than individual characteristics: a vignette study among adults preparing for ageing. Psychol. Health 21, 809\u2013825 (2006)","journal-title":"Psychol. Health"},{"key":"9_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0968-090X(96)00025-3","volume":"5","author":"JD Laan Van Der","year":"1997","unstructured":"Van Der Laan, J.D., Heino, A., De Waard, D.: A simple procedure for the assessment of acceptance of advanced transport telematics. Transp. Res. Part C: Emerg. Technol. 5, 1\u201310 (1997)","journal-title":"Transp. Res. Part C: Emerg. Technol."},{"key":"9_CR25","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1086\/209301","volume":"19","author":"JE Bateson","year":"1992","unstructured":"Bateson, J.E., Hui, M.K.: The ecological validity of photographic slides and videotapes in simulating the service setting. J. Consum. Res. 19, 271\u2013281 (1992)","journal-title":"J. Consum. Res."},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"907","DOI":"10.2466\/pms.1990.71.3.907","volume":"71","author":"AE Stamps III","year":"1990","unstructured":"Stamps III, A.E.: Use of photographs to simulate environments: a meta-analysis. Percept. Mot. Skills 71, 907\u2013913 (1990)","journal-title":"Percept. Mot. Skills"},{"key":"9_CR27","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.compenvurbsys.2015.09.006","volume":"54","author":"SF Kuliga","year":"2015","unstructured":"Kuliga, S.F., Thrash, T., Dalton, R.C., H\u00f6lscher, C.: Virtual reality as an empirical research tool\u2014exploring user experience in a real building and a corresponding virtual model. Comput. Environ. Urban Syst. 54, 363\u2013375 (2015)","journal-title":"Comput. Environ. Urban Syst."},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Thomasen, K.: Beyond Airspace Safety: A Feminist Perspective on Drone Privacy Regulation (2017)","DOI":"10.2139\/ssrn.3143655"},{"key":"9_CR29","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MTS.2018.2795121","volume":"37","author":"LM PytlikZillig","year":"2018","unstructured":"PytlikZillig, L.M., Duncan, B., Elbaum, S., Detweiler, C.: A drone by any other name: purposes, end-user trustworthiness, and framing, but not terminology, affect public support for drones. IEEE Technol. Soc. Mag. 37, 80\u201391 (2018)","journal-title":"IEEE Technol. Soc. Mag."}],"container-title":["Lecture Notes in Computer Science","Persuasive Technology: Development of Persuasive and Behavior Change Support Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-17287-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T09:39:05Z","timestamp":1558345145000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-17287-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030172862","9783030172879"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-17287-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"3 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PERSUASIVE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Persuasive Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"persuasive2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.persuasive2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"79","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}