{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:17:16Z","timestamp":1743074236550,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030507312"},{"type":"electronic","value":"9783030507329"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50732-9_12","type":"book-chapter","created":{"date-parts":[[2020,7,11]],"date-time":"2020-07-11T07:02:59Z","timestamp":1594450979000},"page":"82-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A User-Centered Approach to Digital Household Risk Management"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4139-6331","authenticated-orcid":false,"given":"Cristina","family":"Paupini","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7939-6340","authenticated-orcid":false,"given":"G. Anthony","family":"Giannoumis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1688-7377","authenticated-orcid":false,"given":"Terje","family":"Gj\u00f8s\u00e6ter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1177\/1461444807085326","volume":"10","author":"J Helle-Valle","year":"2008","unstructured":"Helle-Valle, J., Sletteme\u00e5s, D.: ICTs, domestication and language-games: a Wittgensteinian approach to media uses. New Media Soc. 10(1), 45\u201366 (2008)","journal-title":"New Media Soc."},{"unstructured":"Kuruczleki, E., et al.: The Readiness of the european union to embrace the fourth industrial revolution. Management (18544223), 11(4) (2016)","key":"12_CR2"},{"doi-asserted-by":"crossref","unstructured":"Dorsemaine, B., et al.: Internet of things: a definition & taxonomy. In: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE (2015)","key":"12_CR3","DOI":"10.1109\/NGMAST.2015.71"},{"issue":"15","key":"12_CR4","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"unstructured":"Ferrara, P., Spoto, F.: Static analysis for GDPR compliance. In: ITASEC (2018)","key":"12_CR5"},{"issue":"3","key":"12_CR6","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s10209-009-0171-2","volume":"9","author":"G Sauer","year":"2010","unstructured":"Sauer, G., et al.: Accessible privacy and security: a universally usable human-interaction proof tool. Univ. Access Inf. Soc. 9(3), 239\u2013248 (2010)","journal-title":"Univ. Access Inf. Soc."},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-642-21672-5_49","volume-title":"Universal Access in Human-Computer Interaction. Design for All and eInclusion","author":"KS Fuglerud","year":"2011","unstructured":"Fuglerud, K.S.: The barriers to and benefits of use of ict for people with visual impairment. In: Stephanidis, C. (ed.) UAHCI 2011. LNCS, vol. 6765, pp. 452\u2013462. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21672-5_49"},{"issue":"3","key":"12_CR8","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"19","author":"MA Sasse","year":"2001","unstructured":"Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the \u2018weakest link\u2019\u2014a human\/computer interaction approach to usable and effective security. BT Technol. J. 19(3), 122\u2013131 (2001)","journal-title":"BT Technol. J."},{"unstructured":"Schwab, K.: The Fourth Industrial Revolution. Currency (2017)","key":"12_CR9"},{"key":"12_CR10","volume-title":"Home, Tweet Home\u201d: Implications of the Connected Home, Human and Habitat on Australian Consumers","author":"A Vulkanovski","year":"2016","unstructured":"Vulkanovski, A.: Home, Tweet Home\u201d: Implications of the Connected Home, Human and Habitat on Australian Consumers. Australian Communications Consumer Action Network, Sydney (2016)"},{"doi-asserted-by":"crossref","unstructured":"Bertino, E. Data Security and Privacy in the IoT. in EDBT. 2016","key":"12_CR11","DOI":"10.1109\/BigData.2016.7840581"},{"issue":"1","key":"12_CR12","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella, A., et al.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22\u201332 (2014)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"12_CR13","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1287\/isre.2016.0683","volume":"27","author":"S Ransbotham","year":"2016","unstructured":"Ransbotham, S., et al.: Special section introduction\u2014ubiquitous IT and digital vulnerabilities. Inf. Syst. Res. 27(4), 834\u2013847 (2016)","journal-title":"Inf. Syst. Res."},{"unstructured":"Angrishi, K.: Turning internet of things (iot) into internet of vulnerabilities (iov): Iot botnets (2017). arXiv preprint arXiv:1702.03681","key":"12_CR14"},{"doi-asserted-by":"crossref","unstructured":"Xi, W., Ling, L.: Research on IoT privacy security risks. In: 2016 International Conference on Industrial Informatics-Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII). IEEE (2016)","key":"12_CR15","DOI":"10.1109\/ICIICII.2016.0069"},{"unstructured":"Rawlinson, K.: Hp study reveals 70 percent of internet of things devices vulnerable to attack. HP, 29, July 2014","key":"12_CR16"},{"doi-asserted-by":"crossref","unstructured":"Bertino, E.: Data privacy for IoT systems: concepts, approaches, and research directions. In: 2016 IEEE International Conference on Big Data (Big Data). IEEE (2016)","key":"12_CR17","DOI":"10.1109\/BigData.2016.7841030"},{"issue":"7","key":"12_CR18","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.tele.2017.04.013","volume":"34","author":"S Barth","year":"2017","unstructured":"Barth, S., De Jong, M.D.: The privacy paradox\u2013Investigating discrepancies between expressed privacy concerns and actual online behavior\u2013a systematic literature review. Telematics Inf. 34(7), 1038\u20131058 (2017)","journal-title":"Telematics Inf."},{"issue":"1","key":"12_CR19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 3(1), 26\u201333 (2005)","journal-title":"IEEE Secur. Priv."},{"doi-asserted-by":"crossref","unstructured":"Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In: Proceedings of the 3rd ACM Conference on Electronic Commerce. ACM (2001)","key":"12_CR20","DOI":"10.1145\/501158.501163"},{"doi-asserted-by":"crossref","unstructured":"Morando, F., R. Iemma, and E. Raiteri, Privacy evaluation: what empirical research on users\u2019 valuation of personal data tells us. Internet Policy Rev. 3(2) (2014)","key":"12_CR21","DOI":"10.14763\/2014.2.283"},{"issue":"1","key":"12_CR22","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100\u2013126 (2007)","journal-title":"J. Consum. Aff."},{"unstructured":"Cohen, D., Crabtree, B.: Qualitative research guidelines project (2006)","key":"12_CR23"},{"doi-asserted-by":"crossref","unstructured":"Bilandzic, M., Venable, J.: Towards participatory action design research: adapting action research and design science research methods for urban informatics. J. Commun. Inf. 7(3) (2011)","key":"12_CR24","DOI":"10.15353\/joci.v7i3.2592"},{"issue":"3","key":"12_CR25","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1177\/0001848191041003003","volume":"41","author":"R McTaggart","year":"1991","unstructured":"McTaggart, R.: Principles for participatory action research. Adult Educ. Q. 41(3), 168\u2013187 (1991)","journal-title":"Adult Educ. Q."},{"issue":"1","key":"12_CR26","first-page":"5","volume":"4","author":"EB-N Sanders","year":"2008","unstructured":"Sanders, E.B.-N., Stappers, P.J.: Co-creation and the new landscapes of design. Co-design 4(1), 5\u201318 (2008)","journal-title":"Co-design"},{"unstructured":"Sch\u00f6n, D.A.: The Reflective Practitioner, vol. 1083, New York (1983)","key":"12_CR27"}],"container-title":["Communications in Computer and Information Science","HCI International 2020 - Posters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50732-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T23:03:28Z","timestamp":1720652608000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50732-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030507312","9783030507329"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50732-9_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}