{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:21:43Z","timestamp":1767651703046,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030256289"},{"type":"electronic","value":"9783030256296"}],"license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-25629-6_123","type":"book-chapter","created":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T09:07:53Z","timestamp":1563959273000},"page":"790-795","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Let Users Control Their Data \u2013 Privacy Policy-Based User Interface Design"],"prefix":"10.1007","author":[{"given":"Armin","family":"Gerl","sequence":"first","affiliation":[]},{"given":"Bianca","family":"Meier","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Becher","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"123_CR1","doi-asserted-by":"publisher","first-page":"49","DOI":"10.5771\/9783845283678-49","volume-title":"Big Data - In den F\u00e4ngen der Datenkraken","author":"Klaus Mainzer","year":"2017","unstructured":"Mainzer K.: Big data und die macht der algorithmen. In: Schr\u00f6der M., Schwanebeck A. (Hrsg.) Big Data - In den F\u00e4ngen der Datenkraken, pp. 49\u201370 Die (un-)heimliche Macht der Algorithmen, 1st edn. (2017). ISBN print: 978-3-8487-4147-2"},{"key":"123_CR2","first-page":"41","volume-title":"Lecture Notes in Computer Science","author":"Armin Gerl","year":"2018","unstructured":"Gerl, A., Bennani, N., Kosch, H., Brunie, L.: LPL, towards a GDPR-compliant privacy language: formal definition and usage. In: Springer, Heidelberg, pp. 41\u201380 (2018)"},{"key":"123_CR3","doi-asserted-by":"crossref","unstructured":"Cranor, L.F., Arjula, M., Guduru, P.: Use of a p 3p user agent by earlyadopters. In: 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, pp. 1\u201310. ACM, New York (2002)","DOI":"10.1145\/644527.644528"},{"key":"123_CR4","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-642-20317-6_14","volume-title":"Privacy and Identity Management for Life","author":"Julio Angulo","year":"2011","unstructured":"Angulo, J., Fischer-H\u00fcbner, S., Pulls, T., K\u00f6nig, U.: HCI for policy display and administration. In: Springer, Heidelberg, pp. 261\u2013277 (2011)"},{"key":"123_CR5","doi-asserted-by":"crossref","unstructured":"Raschke, P., K\u00fcpper, A., Drozd, O., Kirrane, S.: Designing a GDPR-compliant and usable privacy dashboard. In: IFIP Advances in Information and Communication Technology (IFIPAICT 2018), Springer. IFIP Summer School 2017, Ispra, Italy, 3\u20138 September 2017","DOI":"10.1007\/978-3-319-92925-5_14"},{"key":"123_CR6","unstructured":"Gerl, A., Prey, F.: LPL Personal privacy policy user interface: design and evaluation. In: Dachselt, R., Weber, G. (Hrsg.) Mensch und Computer 2018 - Workshopband. Bonn: Gesellschaft f\u00fcr Informatik e.V. (2018)"},{"key":"123_CR7","unstructured":"Wilhelm, S., Gerl, A.: Policy-based authentication and authorization based on the layered privacy language. In: Meyer, H., et al. (Hrsg.) Datenbanksysteme f\u00fcr Business Technologie und Web (BTW2019) - Workshopband, pp. 245\u2013255. GI, Rostock (2019)"},{"key":"123_CR8","unstructured":"Gerl, A., B\u00f6lz, F.: Layered Privacy Language (LPL) pseudonymization extension for health care. In: MEDINFO 2019: The 17th World Congress on Medical and Health Informatics Health and Wellbeing E-Networks for All, IMIA MedInfo Proceedings (2019)"},{"key":"123_CR9","unstructured":"Council of the European Union: General data protection regulation. Regulation (EU) 2016 of the European Parliament and of the Council of on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC, April 2016"}],"container-title":["Advances in Intelligent Systems and Computing","Human Interaction and Emerging Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-25629-6_123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T11:37:13Z","timestamp":1564400233000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-25629-6_123"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"ISBN":["9783030256289","9783030256296"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-25629-6_123","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"25 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IHIET","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Interaction and Emerging Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nice","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ihiet2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ihiet.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}