{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:25:25Z","timestamp":1776101125291,"version":"3.50.1"},"publisher-location":"Cham","reference-count":72,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030293864","type":"print"},{"value":"9783030293871","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29387-1_5","type":"book-chapter","created":{"date-parts":[[2019,8,24]],"date-time":"2019-08-24T10:02:35Z","timestamp":1566640955000},"page":"67-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["What About My Privacy, Habibi?"],"prefix":"10.1007","author":[{"given":"Mennatallah","family":"Saleh","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Sturm","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,25]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Abokhodair, N., Vieweg, S.: Privacy & social media in the context of the Arab Gulf. In: Proceedings of the DIS 2016, pp. 672\u2013683. ACM (2016)","DOI":"10.1145\/2901790.2901873"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Ahmed, S.I., Guha, S., Rifat, M.R., Shezan, F.H., Dell, N.: Privacy in repair: an analysis of the privacy challenges surrounding broken digital artifacts in Bangladesh. In: Proceedings of the ICTD 2016, pp. 11:1\u201311:10. ACM (2016). https:\/\/doi.org\/10.1145\/2909609.2909661","DOI":"10.1145\/2909609.2909661"},{"issue":"CSCW","key":"5_CR3","doi-asserted-by":"publisher","first-page":"17:1","DOI":"10.1145\/3134652","volume":"1","author":"SI Ahmed","year":"2017","unstructured":"Ahmed, S.I., Haque, M.R., Chen, J., Dell, N.: Digital privacy challenges with shared mobile phone use in Bangladesh. Proc. ACM Hum.-Comput. Interact. 1(CSCW), 17:1\u201317:20 (2017). https:\/\/doi.org\/10.1145\/3134652","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Ahmed, S.I., Haque, M.R., Guha, S., Rifat, M.R., Dell, N.: Privacy, security, and surveillance in the Global South: a study of biometric mobile sim registration in Bangladesh. In: Proceedings of the CHI 2017, pp. 906\u2013918. ACM (2017). https:\/\/doi.org\/10.1145\/3025453.3025961","DOI":"10.1145\/3025453.3025961"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Al-Dawood, A., Abokhodair, N., El mimouni, H., Yarosh, S.: \u201cAgainst marrying a stranger\u201d: marital matchmaking technologies in Saudi Arabia. In: Proceedings of the DIS 2017, pp. 1013\u20131024. ACM (2017). https:\/\/doi.org\/10.1145\/3064663.3064683","DOI":"10.1145\/3064663.3064683"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Alabdulqader, E., Lazem, S., Khamis, M., Dray, S.: Exploring participatory design methods to engage with Arab communities (2018). https:\/\/doi.org\/10.1145\/3170427.3170623","DOI":"10.1145\/3170427.3170623"},{"key":"5_CR7","volume-title":"Communicating with the Arabs: A Handbook for the Business Executive","author":"AJ Almaney","year":"1982","unstructured":"Almaney, A.J., Alwan, A.: Communicating with the Arabs: A Handbook for the Business Executive. Waveland Press, Long Grove (1982)"},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"Alsheikh, T., Rode, J.A., Lindley, S.E.: (Whose) value-sensitive design: a study of long-distance relationships in an Arabic cultural context. In: Proceedings of the CSCW 2011, pp. 75\u201384. ACM (2011). https:\/\/doi.org\/10.1145\/1958824.1958836","DOI":"10.1145\/1958824.1958836"},{"key":"5_CR9","unstructured":"Anderson, L., Wilson, S.: Critical incident technique (1997)"},{"issue":"4","key":"5_CR10","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1594977.1592585","volume":"39","author":"Randy Baden","year":"2009","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM Computer Communication Review, vol. 39, pp. 135\u2013146. ACM (2009)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Bagnall, J., et al.: Consumer cash usage: a cross-country comparison with payment diary survey data (2014). https:\/\/ssrn.com\/abstract=2796990","DOI":"10.2139\/ssrn.2796990"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Belk, R., Sobh, R.: Gender and privacy in Arab Gulf states: implications for consumption and marketing. In: Handbook of Islamic Marketing, pp. 71\u201396 (2011)","DOI":"10.4337\/9780857936028.00013"},{"issue":"5","key":"5_CR13","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1080\/01972240490507956","volume":"20","author":"S Bellman","year":"2004","unstructured":"Bellman, S., Johnson, E.J., Kobrin, S.J., Lohse, G.L.: International differences in information privacy concerns: a global survey of consumers. Inf. Soc. 20(5), 313\u2013324 (2004)","journal-title":"Inf. Soc."},{"key":"5_CR14","series-title":"Human-Computer Interaction Series","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/1-4020-2148-8_4","volume-title":"Designing Personalized User Experiences in eCommerce","author":"P Briggs","year":"2004","unstructured":"Briggs, P., Simpson, B., De Angeli, A.: Personalisation and trust: a reciprocal relationship? In: Karat, C.M., Blom, J.O., Karat, J. (eds.) Designing Personalized User Experiences in eCommerce. HCIS, vol. 5, pp. 39\u201355. Springer, Dordrecht (2004). https:\/\/doi.org\/10.1007\/1-4020-2148-8_4"},{"issue":"4","key":"5_CR15","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1177\/0042085905276389","volume":"40","author":"CC Ching","year":"2005","unstructured":"Ching, C.C., Basham, J.D., Jang, E.: The legacy of the digital divide: gender, socioeconomic status, and early exposure as predictors of full-spectrum technology use among young adults. Urban Educ. 40(4), 394\u2013411 (2005)","journal-title":"Urban Educ."},{"key":"5_CR16","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-11762-6_9","volume-title":"Human Work Interaction Design: Usability in Social, Cultural and Organizational Contexts","author":"T Clemmensen","year":"2010","unstructured":"Clemmensen, T., Roese, K.: An overview of a decade of journal publications about culture and human-computer interaction (HCI). In: Katre, D., Orngreen, R., Yammiyavar, P., Clemmensen, T. (eds.) HWID 2009. IAICT, vol. 316, pp. 98\u2013112. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11762-6_9"},{"issue":"12","key":"5_CR17","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2009.5350374","volume":"47","author":"LA Cutillo","year":"2009","unstructured":"Cutillo, L.A., Molva, R., Strufe, T.: Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47(12), 94\u2013101 (2009)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"5_CR18","doi-asserted-by":"publisher","first-page":"57","DOI":"10.4018\/jgim.2006100103","volume":"14","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I.: Internet users privacy concerns and beliefs about government surveillance. J. Glob. Inf. Manag. 14(4), 57\u201393 (2006). https:\/\/doi.org\/10.4018\/jgim.2006100103","journal-title":"J. Glob. Inf. Manag."},{"issue":"3","key":"5_CR19","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1111\/j.1529-1006.2004.00018.x","volume":"5","author":"D Dunning","year":"2004","unstructured":"Dunning, D., Heath, C., Suls, J.M.: Flawed self-assessment: implications for health, education, and the workplace. Psychol. Sci. Public Interest 5(3), 69\u2013106 (2004)","journal-title":"Psychol. Sci. Public Interest"},{"key":"5_CR20","unstructured":"Edwards, A.L.: The social desirability variable in personality assessment and research (1957)"},{"key":"5_CR21","doi-asserted-by":"publisher","unstructured":"Egelman, S., Jain, S., Portnoff, R.S., Liao, K., Consolvo, S., Wagner, D.: Are you ready to lock? In: Proceedings of the CCS 2014, pp. 750\u2013761. ACM (2014). https:\/\/doi.org\/10.1145\/2660267.2660273","DOI":"10.1145\/2660267.2660273"},{"key":"5_CR22","doi-asserted-by":"publisher","unstructured":"Egelman, S., Peer, E.: The myth of the average user: improving privacy and security systems through individualization. In: Proceedings of the NSPW 2015, pp. 16\u201328. ACM (2015). https:\/\/doi.org\/10.1145\/2841113.2841115","DOI":"10.1145\/2841113.2841115"},{"key":"5_CR23","doi-asserted-by":"publisher","unstructured":"Eiband, M., Khamis, M., von Zezschwitz, E., Hussmann, H., Alt, F.: Understanding shoulder surfing in the wild: stories from users and observers. In: Proceedings of the CHI 2017, pp. 4254\u20134265. ACM (2017). https:\/\/doi.org\/10.1145\/3025453.3025636","DOI":"10.1145\/3025453.3025636"},{"key":"5_CR24","doi-asserted-by":"publisher","unstructured":"Eiband, M., von Zezschwitz, E., Buschek, D., Hussmann, H.: My scrawl hides it all: protecting text messages against shoulder surfing with handwritten fonts. In: Proceedings of the CHI EA 2016, pp. 2041\u20132048. ACM (2016). https:\/\/doi.org\/10.1145\/2851581.2892511","DOI":"10.1145\/2851581.2892511"},{"issue":"9","key":"5_CR25","doi-asserted-by":"publisher","first-page":"962","DOI":"10.26719\/2012.18.9.962","volume":"18","author":"A El-Gilany","year":"2012","unstructured":"El-Gilany, A., El-Wehady, A., El-Wasify, M.: Updating and validation of the socioeconomic status scale for health research in Egypt\/mise \u00e0 jour et validation d\u2019une \u00e9chelle du statut socio\u00e9conomique pour la recherche en sant\u00e9 en \u00e9gypte. East. Mediterr. Health J. 18(9), 962 (2012)","journal-title":"East. Mediterr. Health J."},{"issue":"6","key":"5_CR26","first-page":"442","volume":"28","author":"AH El-Gilany","year":"2008","unstructured":"El-Gilany, A.H., Amr, M., Hammad, S.: Perceived stress among male medical students in Egypt and Saudi Arabia: effect of sociodemographic factors. Ann. Saudi Med. 28(6), 442\u2013448 (2008)","journal-title":"Ann. Saudi Med."},{"issue":"8","key":"5_CR27","first-page":"1241","volume":"46","author":"W Elias","year":"2012","unstructured":"Elias, W., Shiftan, Y.: The influence of individual\u2019s risk perception and attitudes on travel behavior. Transp. Res. Part A: Policy Pract. 46(8), 1241\u20131251 (2012). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0965856412000882","journal-title":"Transp. Res. Part A: Policy Pract."},{"key":"5_CR28","first-page":"95","volume":"13","author":"S Fahmy","year":"1983","unstructured":"Fahmy, S.: Determining simple parameters for social classifications for health research. Bull. High Inst. Public Health 13, 95\u2013108 (1983)","journal-title":"Bull. High Inst. Public Health"},{"issue":"3","key":"5_CR29","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/S0147-1767(97)00005-9","volume":"21","author":"E Feghali","year":"1997","unstructured":"Feghali, E.: Arab cultural communication patterns. Int. J. Intercult. Relat. 21(3), 345\u2013378 (1997)","journal-title":"Int. J. Intercult. Relat."},{"issue":"1","key":"5_CR30","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s11192-016-1927-0","volume":"109","author":"U Finardi","year":"2016","unstructured":"Finardi, U., Buratti, A.: Scientific collaboration framework of BRICS countries: an analysis of international coauthorship. Scientometrics 109(1), 433\u2013446 (2016). https:\/\/doi.org\/10.1007\/s11192-016-1927-0","journal-title":"Scientometrics"},{"key":"5_CR31","unstructured":"Miniwatts Marketing Group: Internet world stats. https:\/\/www.internetworldstats.com\/stats.htm. Accessed 18 Sept 2018"},{"key":"5_CR32","volume-title":"Applied Thematic Analysis","author":"G Guest","year":"2011","unstructured":"Guest, G., MacQueen, K.M., Namey, E.E.: Applied Thematic Analysis. Sage Publications, Thousand Oaks (2011)"},{"key":"5_CR33","doi-asserted-by":"publisher","unstructured":"Harbach, M., De Luca, A., Malkin, N., Egelman, S.: Keep on lockin\u2019 in the free world: a multi-national comparison of smartphone locking. In: Proceedings of the CHI 2016, pp. 4823\u20134827. ACM (2016). https:\/\/doi.org\/10.1145\/2858036.2858273","DOI":"10.1145\/2858036.2858273"},{"key":"5_CR34","doi-asserted-by":"publisher","unstructured":"Harbach, M., Fahl, S., Smith, M.: Who\u2019s afraid of which bad wolf? A survey of IT security risk awareness. In: Proceedings of the IEEE CSF 2014, pp. 97\u2013110, July 2014. https:\/\/doi.org\/10.1109\/CSF.2014.15","DOI":"10.1109\/CSF.2014.15"},{"key":"5_CR35","unstructured":"Harbach, M., von Zezschwitz, E., Fichtner, A., Luca, A.D., Smith, M.: It\u2019s a hard lock life: a field study of smartphone (un)locking behavior and risk perception. In: Proceedings of the SOUPS 2014, pp. 213\u2013230. USENIX Association (2014). https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/harbach"},{"issue":"7302","key":"5_CR36","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1038\/466029a","volume":"466","author":"J Henrich","year":"2010","unstructured":"Henrich, J., Heine, S.J., Norenzayan, A.: Most people are not weird. Nature 466(7302), 29 (2010)","journal-title":"Nature"},{"issue":"2\u20133","key":"5_CR37","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1017\/S0140525X0999152X","volume":"33","author":"J Henrich","year":"2010","unstructured":"Henrich, J., Heine, S.J., Norenzayan, A.: The weirdest people in the world? Behav. Brain Sci. 33(2\u20133), 61\u201383 (2010). https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/20550733","journal-title":"Behav. Brain Sci."},{"issue":"1","key":"5_CR38","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s00779-016-0982-0","volume":"21","author":"M Jones","year":"2017","unstructured":"Jones, M., et al.: Beyond \u201cyesterday\u2019s tomorrow\u201d: future-focused mobile interaction design by and for emergent users. Pers. Ubiquitous Comput. 21(1), 157\u2013171 (2017). https:\/\/doi.org\/10.1007\/s00779-016-0982-0","journal-title":"Pers. Ubiquitous Comput."},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Karlson, A.K., Brush, A., Schechter, S.: Can i borrow your phone?: understanding concerns when sharing mobile phones. In: Proceedings of the CHI 2009, pp. 1647\u20131650. ACM (2009)","DOI":"10.1145\/1518701.1518953"},{"key":"5_CR40","unstructured":"Kelley, E.E., Motika, F., Motika, P.V., Motika, E.M.: Secure credit card, US Patent 6,641,050, 4 Nov 2003"},{"key":"5_CR41","doi-asserted-by":"publisher","unstructured":"Lazem, S., Jad, H.A.: We play we learn: exploring the value of digital educational games in rural Egypt. In: Proceedings of the CHI 2017, pp. 2782\u20132791. ACM (2017). https:\/\/doi.org\/10.1145\/3025453.3025593","DOI":"10.1145\/3025453.3025593"},{"issue":"4","key":"5_CR42","doi-asserted-by":"publisher","first-page":"11","DOI":"10.2753\/JEC1086-4415110401","volume":"11","author":"I Lee","year":"2007","unstructured":"Lee, I., Choi, B., Kim, J., Hong, S.J.: Culture-technology fit: effects of cultural characteristics on the post-adoption beliefs of mobile internet users. Int. J. Electron. Commer. 11(4), 11\u201351 (2007)","journal-title":"Int. J. Electron. Commer."},{"key":"5_CR43","volume-title":"The Offensive Internet","author":"S Levmore","year":"2010","unstructured":"Levmore, S., Nussbaum, M.C.: The Offensive Internet. Harvard University Press, Cambridge (2010)"},{"issue":"2","key":"5_CR44","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1515\/popets-2017-0019","volume":"2017","author":"Y Li","year":"2017","unstructured":"Li, Y., Kobsa, A., Knijnenburg, B.P., Nguyen, M.C.: Cross-cultural privacy prediction. Proc. Priv. Enhancing Technol. 2017(2), 113\u2013132 (2017)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Marques, D., Guerreiro, T., Carri\u00e7o, L.: Measuring snooping behavior with surveys: it\u2019s how you ask it. In: Proceedings of the CHI EA 2014, pp. 2479\u20132484. ACM (2014)","DOI":"10.1145\/2559206.2581240"},{"key":"5_CR46","volume-title":"Qualitative Data Analysis: An Expanded Sourcebook","author":"MB Miles","year":"1994","unstructured":"Miles, M.B., Huberman, A.M., Huberman, M.A., Huberman, M.: Qualitative Data Analysis: An Expanded Sourcebook. Sage, Thousand Oaks (1994)"},{"key":"5_CR47","doi-asserted-by":"publisher","first-page":"228","DOI":"10.2307\/2095107","volume":"48","author":"J Mirowsky","year":"1983","unstructured":"Mirowsky, J., Ross, C.E.: Paranoia and the structure of powerlessness. Am. Sociol. Rev. 48, 228\u2013239 (1983)","journal-title":"Am. Sociol. Rev."},{"issue":"4","key":"5_CR48","first-page":"74","volume":"6","author":"AAA Mohamed","year":"2010","unstructured":"Mohamed, A.A.A.: Online privacy concerns among social networks\u2019 users\/question concernant les affaires personnelles des utilisateurs de r\u00e9seaux sociaux en ligne. Cross-Cult. Commun. 6(4), 74 (2010)","journal-title":"Cross-Cult. Commun."},{"key":"5_CR49","unstructured":"Mounir, H.: Only 33% of Egyptian adults own bank accounts: deputy CBE governor (2017). https:\/\/dailynewsegypt.com\/2017\/10\/24\/33-egyptian-adults-bank-accounts-deputy-cbe-governor\/. Accessed 18 Sept 2018"},{"key":"5_CR50","doi-asserted-by":"publisher","unstructured":"Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., Beznosov, K.: Know your enemy: the risk of unauthorized access in smartphones by insiders. In: Proceedings of the MobileHCI 2013, pp. 271\u2013280. ACM (2013). https:\/\/doi.org\/10.1145\/2493190.2493223","DOI":"10.1145\/2493190.2493223"},{"key":"5_CR51","doi-asserted-by":"publisher","unstructured":"Nassir, S., Leong, T.W.: Traversing boundaries: understanding the experiences of ageing Saudis. In: Proceedings of the CHI 2017, pp. 6386\u20136397. ACM (2017). https:\/\/doi.org\/10.1145\/3025453.3025618","DOI":"10.1145\/3025453.3025618"},{"issue":"2","key":"5_CR52","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1037\/h0087734","volume":"70","author":"AY Nobles","year":"2000","unstructured":"Nobles, A.Y., Sciarra, D.T.: Cultural determinants in the treatment of Arab Americans: a primer for mainstream therapists. Am. J. Orthopsychiatry 70(2), 182 (2000)","journal-title":"Am. J. Orthopsychiatry"},{"key":"5_CR53","doi-asserted-by":"publisher","unstructured":"Robinson, S., Pearson, J., Reitmaier, T., Ahire, S., Jones, M.: Make yourself at phone: reimagining mobile interaction architectures with emergent users. In: Proceedings of the CHI 2018, pp. 407:1\u2013407:12. ACM (2018). https:\/\/doi.org\/10.1145\/3173574.3173981","DOI":"10.1145\/3173574.3173981"},{"key":"5_CR54","doi-asserted-by":"publisher","unstructured":"Saleh, M., Khamis, M., Sturm, C.: Privacy invasion experiences and perceptions: a comparison between Germany and the Arab world. In: Proceedings of the CHI EA 2018. ACM (2018). https:\/\/doi.org\/10.1145\/3170427.3188671","DOI":"10.1145\/3170427.3188671"},{"key":"5_CR55","unstructured":"Sambasivan, N., et al.: \u201cPrivacy is not for me, it\u2019s for those rich women\u201d: performative privacy practices on mobile phones by women in South Asia. In: Proceedings of the SOUPS 2018, pp. 127\u2013142. USENIX Association (2018). https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/sambasivan"},{"issue":"3","key":"5_CR56","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/3058496","volume":"24","author":"N Sambasivan","year":"2017","unstructured":"Sambasivan, N., Jain, N., Checkley, G., Baki, A., Herr, T.: A framework for technology design for emerging markets. Interactions 24(3), 70\u201373 (2017). https:\/\/doi.org\/10.1145\/3058496","journal-title":"Interactions"},{"key":"5_CR57","doi-asserted-by":"publisher","DOI":"10.5743\/cairo\/9789774160165.001.0001","volume-title":"Transforming Education in Egypt: Western Influence and Domestic Policy Reform","author":"FH Sayed","year":"2006","unstructured":"Sayed, F.H.: Transforming Education in Egypt: Western Influence and Domestic Policy Reform. American University in Cairo Press, Cairo (2006)"},{"issue":"6","key":"5_CR58","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1086\/224567","volume":"73","author":"B Schwartz","year":"1968","unstructured":"Schwartz, B.: The social psychology of privacy. Am. J. Sociol. 73(6), 741\u2013752 (1968)","journal-title":"Am. J. Sociol."},{"key":"5_CR59","unstructured":"Solove, D.J.: Speech, privacy, and reputation on the internet. In: Lovmore, S., Nussbaum, M. (eds.) The Offensive Internet (2010)"},{"key":"5_CR60","doi-asserted-by":"publisher","unstructured":"Sturm, C., Oh, A., Linxen, S., Abdelnour Nocera, J., Dray, S., Reinecke, K.: How WEIRD is HCI?: extending HCI principles to other countries and cultures. In: Proceedings of the CHI EA 2015, pp. 2425\u20132428. ACM (2015). https:\/\/doi.org\/10.1145\/2702613.2702656","DOI":"10.1145\/2702613.2702656"},{"key":"5_CR61","unstructured":"Sunstein, C.: Believing false rumors. The (2010)"},{"key":"5_CR62","doi-asserted-by":"publisher","unstructured":"Talhouk, R., et al.: Syrian refugees and digital health in Lebanon: opportunities for improving antenatal health. In: Proceedings of the CHI 2016, pp. 331\u2013342. ACM (2016). https:\/\/doi.org\/10.1145\/2858036.2858331","DOI":"10.1145\/2858036.2858331"},{"issue":"1","key":"5_CR63","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1002\/dir.4000070104","volume":"7","author":"P Wang","year":"1993","unstructured":"Wang, P., Petrison, L.A.: Direct marketing activities and personal privacy: a consumer survey. J. Direct Mark. 7(1), 7\u201319 (1993)","journal-title":"J. Direct Mark."},{"key":"5_CR64","doi-asserted-by":"crossref","unstructured":"Weber, S., Harbach, M., Smith, M.: Participatory design for security-related user interfaces. In: Proceedings of the USEC 2015 (2015)","DOI":"10.14722\/usec.2015.23011"},{"key":"5_CR65","volume-title":"Privacy and Freedom","author":"AF Westin","year":"2015","unstructured":"Westin, A.F., Ruebhausen, O.M.: Privacy and Freedom. Ig Publishing, New York (2015)"},{"key":"5_CR66","doi-asserted-by":"publisher","unstructured":"Wilkinson, D., et al.: Moving beyond a \u201cone-size fits all\u201d approach: exploring individual differences in privacy (2018). https:\/\/doi.org\/10.1145\/3170427.3170617","DOI":"10.1145\/3170427.3170617"},{"key":"5_CR67","doi-asserted-by":"publisher","unstructured":"Wisniewski, P., Islam, A.N., Knijnenburg, B.P., Patil, S.: Give social network users the privacy they want. In: Proceedings of the CSCW 2015, pp. 1427\u20131441. ACM (2015). https:\/\/doi.org\/10.1145\/2675133.2675256","DOI":"10.1145\/2675133.2675256"},{"key":"5_CR68","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.ijhcs.2016.09.006","volume":"98","author":"PJ Wisniewski","year":"2017","unstructured":"Wisniewski, P.J., Knijnenburg, B.P., Lipford, H.R.: Making privacy personal: profiling social network users to inform privacy education and nudging. Int. J. Hum.-Comput. Stud. 98, 95\u2013108 (2017). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1071581916301185","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"5_CR69","doi-asserted-by":"publisher","unstructured":"Yardi, S., Bruckman, A.: Income, race, and class: exploring socioeconomic differences in family technology use. In: Proceedings of the CHI 2012, pp. 3041\u20133050. ACM (2012). https:\/\/doi.org\/10.1145\/2207676.2208716","DOI":"10.1145\/2207676.2208716"},{"key":"5_CR70","unstructured":"Yoo, C.W., Ahn, H.J., Rao, H.R.: An exploration of the impact of information privacy invasion (2012)"},{"key":"5_CR71","doi-asserted-by":"publisher","unstructured":"von Zezschwitz, E., De Luca, A., Brunkow, B., Hussmann, H.: SwiPIN: fast and secure pin-entry on smartphones. In: Proceedings of the CHI 2015, pp. 1403\u20131406. ACM (2015). https:\/\/doi.org\/10.1145\/2702123.2702212","DOI":"10.1145\/2702123.2702212"},{"key":"5_CR72","doi-asserted-by":"publisher","unstructured":"von Zezschwitz, E., Ebbinghaus, S., Hussmann, H., De Luca, A.: You can\u2019t watch this!: privacy-respectful photo browsing on smartphones. In: Proceedings of the CHI 2016, pp. 4320\u20134324. ACM (2016). https:\/\/doi.org\/10.1145\/2858036.2858120","DOI":"10.1145\/2858036.2858120"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29387-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T14:18:56Z","timestamp":1721657936000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29387-1_5"}},"subtitle":["Understanding Privacy Concerns and Perceptions of Users from Different Socioeconomic Groups in the Arab World"],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030293864","9783030293871"],"references-count":72,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29387-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"25 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paphos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/interact2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"385","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"111","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48 other papers were accepted.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}