{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:15:03Z","timestamp":1742944503144,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030425036"},{"type":"electronic","value":"9783030425043"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-42504-3_3","type":"book-chapter","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T18:03:57Z","timestamp":1583863437000},"page":"29-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Opportunities and Challenges of Dynamic Consent in Commercial Big Data Analytics"],"prefix":"10.1007","author":[{"given":"Eva","family":"Schlehahn","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Murmann","sequence":"additional","affiliation":[]},{"given":"Farzaneh","family":"Karegar","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,6]]},"reference":[{"key":"3_CR1","unstructured":"Article 29 Data Protection Working Party: Guidelines on consent under regulation 2019\/679 (2018)"},{"key":"3_CR2","unstructured":"Article 29 Data Protection Working Party: Opinion 10\/2014 on more harmonised information provisions. Accessed 25 Nov 2004"},{"key":"3_CR3","unstructured":"Article 29 Data Protection Working Party: Guidelines on transparency under Regulation 2016\/679. Accessed 11 Apr 2018"},{"issue":"2","key":"3_CR4","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MSP.2010.84","volume":"8","author":"FH Cate","year":"2010","unstructured":"Cate, F.H.: The limits of notice and choice. IEEE Secur. Priv. 8(2), 59\u201362 (2010)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"3_CR5","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1165734.1165735","volume":"13","author":"LF Cranor","year":"2006","unstructured":"Cranor, L.F., Guduru, P., Arjula, M.: User interfaces for privacy agents. ACM TOCHI 13(2), 135\u2013178 (2006)","journal-title":"ACM TOCHI"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Egelman, S., Cranor, L.F., Hong, J.: You\u2019ve been warned: an empirical study of the effectiveness of web browser phishing warnings. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 1065\u20131074. ACM (2008)","DOI":"10.1145\/1357054.1357219"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-642-20317-6_15","volume-title":"Privacy and Identity Management for Life","author":"LE Holtz","year":"2011","unstructured":"Holtz, L.E., Zwingelberg, H., Hansen, M.: Privacy policy icons. In: Camenisch, J., Fischer-H\u00fcbner, S., Rannenberg, K. (eds.) Privacy and Identity Management for Life, pp. 279\u2013285. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20317-6_15"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Kay, M., Terry, M.: Textured agreements: re-envisioning electronic consent. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, p. 13. ACM (2010)","DOI":"10.1145\/1837110.1837127"},{"issue":"2","key":"3_CR9","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1038\/ejhg.2014.71","volume":"23","author":"J Kaye","year":"2015","unstructured":"Kaye, J., Whitley, E.A., Lund, D., Morrison, M., Teare, H., Melham, K.: Dynamic consent: a patient interface for twenty-first century research networks. Eur. J. Hum. Genet. 23(2), 141 (2015)","journal-title":"Eur. J. Hum. Genet."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Cesca, L., Bresee, J., Cranor, L.F.: Standardizing privacy notices: an online study of the nutrition label approach. In: Proceedings of the CHI, pp. 1573\u20131582. ACM (2010)","DOI":"10.1145\/1753326.1753561"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Luger, E., Moran, S., Rodden, T.: Consent for all: revealing the hidden complexity of terms and conditions. In: Proceedings of the CHI, pp. 2687\u20132696. ACM (2013)","DOI":"10.1145\/2470654.2481371"},{"issue":"4","key":"3_CR12","first-page":"66","volume":"11","author":"P Murmann","year":"2019","unstructured":"Murmann, P.: Eliciting design guidelines for privacy notifications in mhealth environments. Int. J. Mob. HCI 11(4), 66\u201383 (2019)","journal-title":"Int. J. Mob. HCI"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-40956-4_8","volume-title":"Privacy Enhancing Technologies","author":"AS Patrick","year":"2003","unstructured":"Patrick, A.S., Kenny, S.: From privacy legislation to interface design: implementing information privacy in human-computer interactions. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 107\u2013124. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40956-4_8"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"h2146","DOI":"10.1136\/bmj.h2146","volume":"350","author":"T Ploug","year":"2015","unstructured":"Ploug, T., Holm, S.: Meta consent: a flexible and autonomous way of obtaining informed consent for secondary research. BMJ 350, h2146 (2015)","journal-title":"BMJ"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"253","DOI":"10.3389\/fpubh.2018.00253","volume":"6","author":"M Prictor","year":"2018","unstructured":"Prictor, M., Teare, H.J., Kaye, J.: Equitable participation in biobanks: the risks and benefits of a \u201cdynamic consent\u201d approach. Front. Public Health 6, 253 (2018)","journal-title":"Front. Public Health"},{"issue":"3","key":"3_CR16","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MIC.2017.75","volume":"21","author":"F Schaub","year":"2017","unstructured":"Schaub, F., Balebako, R., Cranor, L.F.: Designing effective privacy notices and controls. IEEE Internet Comput. 21(3), 70\u201377 (2017)","journal-title":"IEEE Internet Comput."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Tabassum, M., Alqhatani, A., Aldossari, M., Richter Lipford, H.: Increasing user attention with a comic-based policy. In: Proceedings of the CHI, pp. 200:1\u2013200:6. ACM (2018)","DOI":"10.1145\/3173574.3173774"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Data for Better Living: AI and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-42504-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,10]],"date-time":"2024-03-10T01:19:41Z","timestamp":1710033581000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-42504-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030425036","9783030425043"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-42504-3_3","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Privacy and Identity","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Summer School on Privacy and Identity Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Windisch","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"privacy-identity2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifip-summerschool.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}