{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:17:37Z","timestamp":1761621457570,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223113"},{"type":"electronic","value":"9783030223120"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22312-0_15","type":"book-chapter","created":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T23:02:48Z","timestamp":1560726168000},"page":"209-222","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["To Be, or Not to Be Notified"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Murmann","sequence":"first","affiliation":[]},{"given":"Delphine","family":"Reinhardt","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Dupree, J.L., Devries, R., Berry, D.M., Lank, E.: Privacy personas: clustering users via attitudes and behaviors toward security practices. In: Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI) (2016)","DOI":"10.1145\/2858036.2858214"},{"key":"15_CR2","unstructured":"The European Parliament and the Council of the European Union. Regulation (EU) 2016\/679 of the European Parliament and of the Council (2016)"},{"key":"15_CR3","unstructured":"Fischer-H\u00fcbner, S., Pettersson, J.S., Angulo, J., Edbom, J., Toresson, M., Andersson, H.: D:C-7.3 Report on end-user perceptions of privacy-enhancing transparency and accountability. Technical report D37.3, A4Cloud Project (2014)"},{"key":"15_CR4","unstructured":"Harkous, H., Rahman, R., Aberer, K.: Data-driven privacy indicators. In: Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (2016)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Peter Kincaid, J., Fishburne Jr., R.P., Rogers, R.L., Chissom, B.S.: Derivation of new readability formulas (automated readability index, fog count and flesch reading ease formula) for navy enlisted personnel. Technical report, Institute for Simulation and Training, University of Central Florida (1975)","DOI":"10.21236\/ADA006655"},{"issue":"12","key":"15_CR6","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1016\/j.ijhcs.2013.06.003","volume":"71","author":"BP Knijnenburg","year":"2013","unstructured":"Knijnenburg, B.P., Kobsa, A., Jin, H.: Dimensionality of information disclosure behavior. Int. J. Hum.-Comput. Stud. 71(12), 1144\u20131162 (2013)","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Lowens, B., Motti, V.G., Caine, K.: Wearable privacy: skeletons in the data closet. In: Proceedings of the IEEE International Conference on Healthcare Informatics (ICHI) (2017)","DOI":"10.1109\/ICHI.2017.29"},{"key":"15_CR8","unstructured":"Morton, A.: Individual privacy concern and organisational privacy practice - bridging the gap. Ph.D. thesis, University College London (2015)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Morton, A., Angela Sasse, M.: Desperately seeking assurances: segmenting users by their information-seeking preferences. In: Proceedings of the IEEE Annual International Conference on Privacy, Security and Trust (PST) (2014)","DOI":"10.1109\/PST.2014.6890929"},{"key":"15_CR10","unstructured":"Murmann, P.: Supplementary material. https:\/\/murmann.hotell.kau.se\/notification-preferences\/. Accessed 13 Nov 2018"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"22965","DOI":"10.1109\/ACCESS.2017.2765539","volume":"5","author":"P Murmann","year":"2017","unstructured":"Murmann, P., Fischer-H\u00fcbner, S.: Tools for achieving usable ex post transparency: a survey. IEEE Access 5, 22965\u201322991 (2017)","journal-title":"IEEE Access"},{"key":"15_CR12","unstructured":"Naeini, P.E., et al.: Privacy expectations and preferences in an IoT world. In: Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (2017)"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.jbef.2017.12.004","volume":"17","author":"S Palan","year":"2018","unstructured":"Palan, S., Schitter, C.: Prolific.ac\u2014a subject pool for online experiments. J. Behav. Exp. Finan. 17, 22\u201327 (2018)","journal-title":"J. Behav. Exp. Finan."},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.jesp.2017.01.006","volume":"70","author":"E Peer","year":"2017","unstructured":"Peer, E., Brandimarte, L., Samat, S., Acquisti, A.: Beyond the Turk: alternative platforms for crowdsourcing behavioral research. J. Exp. Soc. Psychol. 70, 153\u2013163 (2017)","journal-title":"J. Exp. Soc. Psychol."},{"key":"15_CR15","unstructured":"Prolific Academic Ltd., Prolific. https:\/\/www.prolific.ac\/demographics. Accessed 27 Aug 2018"},{"key":"15_CR16","unstructured":"Statista. Number of connected wearable devices worldwide from 2016 to 2021. https:\/\/www.statista.com\/statistics\/487291\/. Accessed 28 June 2018"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Wagner, I., He, Y., Rosenberg, D., Janicke, H.: User interface design for privacy awareness in ehealth technologies. In: Proceedings of the IEEE Annual Consumer Communications & Networking Conference (CCNC) (2016)","DOI":"10.1109\/CCNC.2016.7444728"},{"issue":"2","key":"15_CR18","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1111\/1540-4560.00072","volume":"59","author":"AF Westin","year":"2003","unstructured":"Westin, A.F.: Social and political dimensions of privacy. J. Soc. Issues 59(2), 431\u2013453 (2003)","journal-title":"J. Soc. Issues"},{"key":"15_CR19","unstructured":"Woodruff, A., Pihur, V., Consolvo, S., Schmidt, L., Brandimarte, L., Acquisti, A.: Would a privacy fundamentalist sell their DNA for \\$1000... if nothing bad happened as a result? The Westin categories, behavioral intentions, and consequences. In: Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (2014)"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22312-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:35:13Z","timestamp":1710257713000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22312-0_15"}},"subtitle":["Eliciting Privacy Notification Preferences for Online mHealth Services"],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030223113","9783030223120"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22312-0_15","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"5 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"34","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifipsec.org\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}