{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:22:04Z","timestamp":1751516524169,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030773915"},{"type":"electronic","value":"9783030773922"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_25","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"391-402","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Study on Online Businesses\u2019 Commitment to Consumer Privacy"],"prefix":"10.1007","author":[{"given":"May","family":"Almousa","sequence":"first","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tianyang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mohd","family":"Anwar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"issue":"6221","key":"25_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509\u2013514 (2015)","journal-title":"Science"},{"doi-asserted-by":"crossref","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. ACM SIGCOMM Comput. Commun. Rev. 39, 135\u2013146 (2009)","key":"25_CR2","DOI":"10.1145\/1594977.1592585"},{"unstructured":"Federal Trade Commission, et al.: Privacy online: fair information practices in the electronic marketplace: a report to congress. Federal Trade Commission, Washington, DC (2000)","key":"25_CR3"},{"issue":"5","key":"25_CR4","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1037\/h0031619","volume":"76","author":"JL Fleiss","year":"1971","unstructured":"Fleiss, J.L.: Measuring nominal scale agreement among many raters. Psychol. Bull. 76(5), 378 (1971)","journal-title":"Psychol. Bull."},{"issue":"5","key":"25_CR5","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1037\/h0028106","volume":"72","author":"JL Fleiss","year":"1969","unstructured":"Fleiss, J.L., Cohen, J., Everitt, B.S.: Large sample standard errors of kappa and weighted kappa. Psychol. Bull. 72(5), 323 (1969)","journal-title":"Psychol. Bull."},{"doi-asserted-by":"crossref","unstructured":"Guha, S., Tang, K., Francis, P.: NOYB: privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, pp. 49\u201354. ACM (2008)","key":"25_CR6","DOI":"10.1145\/1397735.1397747"},{"doi-asserted-by":"crossref","unstructured":"Habib, H., et al.: \u201cIt\u2019s a scavenger hunt\u201d: usability of websites\u2019 opt-out and data deletion choices. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201312 (2020)","key":"25_CR7","DOI":"10.1145\/3313831.3376511"},{"issue":"1","key":"25_CR8","doi-asserted-by":"publisher","first-page":"23","DOI":"10.20982\/tqmp.08.1.p023","volume":"8","author":"KA Hallgren","year":"2012","unstructured":"Hallgren, K.A.: Computing inter-rater reliability for observational data: an overview and tutorial. Tutor. Quant. Methods Psychol. 8(1), 23 (2012)","journal-title":"Tutor. Quant. Methods Psychol."},{"doi-asserted-by":"crossref","unstructured":"Jensen, C., Potts, C.: Privacy policies as decision-making tools: an evaluation of online privacy notices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 471\u2013478 (2004)","key":"25_CR9","DOI":"10.1145\/985692.985752"},{"issue":"1\u20132","key":"25_CR10","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.ijhcs.2005.04.019","volume":"63","author":"C Jensen","year":"2005","unstructured":"Jensen, C., Potts, C., Jensen, C.: Privacy practices of internet users: self-reports versus observed behavior. Int. J. Hum. Comput. Stud. 63(1\u20132), 203\u2013227 (2005)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"1","key":"25_CR11","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1108\/IJOPM-03-2015-0156","volume":"37","author":"T Kude","year":"2017","unstructured":"Kude, T., Hoehle, H., Sykes, T.A.: Big data breaches and customer compensation strategies: personality traits and social influence as antecedents of perceived compensation. Int. J. Oper. Prod. Manag. IJOPM 37(1), 56\u201374 (2017)","journal-title":"Int. J. Oper. Prod. Manag. IJOPM"},{"unstructured":"Kumar, V.B., et al.: Finding a choice in a haystack: automatic extraction of opt-out statements from privacy policy text. In: The Web Conference (the Web Conference) (2020)","key":"25_CR12"},{"doi-asserted-by":"crossref","unstructured":"Mikhed, V., Vogan, M.: Out of sight, out of mind: consumer reaction to news on data breaches and identity theft (2015)","key":"25_CR13","DOI":"10.21799\/frbp.wp.2015.42"},{"issue":"5","key":"25_CR14","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1080\/01972240290108168","volume":"18","author":"GR Milne","year":"2002","unstructured":"Milne, G.R., Culnan, M.J.: Using the content of online privacy notices to inform public policy: a longitudinal analysis of the 1998\u20132001 us web surveys. Inf. Soc. 18(5), 345\u2013359 (2002)","journal-title":"Inf. Soc."},{"issue":"3","key":"25_CR15","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1002\/dir.20009","volume":"18","author":"GR Milne","year":"2004","unstructured":"Milne, G.R., Culnan, M.J.: Strategies for reducing online privacy risks: Why consumers read (or don\u2019t read) online privacy notices. J. Interact. Mark. 18(3), 15\u201329 (2004)","journal-title":"J. Interact. Mark."},{"doi-asserted-by":"crossref","unstructured":"Mondal, M., Druschel, P., Gummadi, K.P., Mislove, A.: Beyond access control: managing online privacy via exposure. In: Proceedings of the Workshop on Useable Security, pp. 1\u20136 (2014)","key":"25_CR16","DOI":"10.14722\/usec.2014.23046"},{"issue":"1","key":"25_CR17","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100\u2013126 (2007)","journal-title":"J. Consum. Aff."},{"issue":"3","key":"25_CR18","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0969-6997(00)00007-7","volume":"6","author":"EA Nyshadham","year":"2000","unstructured":"Nyshadham, E.A.: Privacy policies of air travel web sites: a survey and analysis. J. Air Transp. Manag. 6(3), 143\u2013152 (2000)","journal-title":"J. Air Transp. Manag."},{"doi-asserted-by":"crossref","unstructured":"Peterson, D., Meinert, D., Criswell, J., Crossland, M.: Consumer trust: privacy policies and third-party seals. J. Small Bus. Enterp. Dev. 14, 654\u2013669 (2007)","key":"25_CR19","DOI":"10.1108\/14626000710832758"},{"unstructured":"U.S. Census Bureau: Quarterly retail e-commerce sales 3rd quarter 2019. U.S. Department of Commerce (2019)","key":"25_CR20"},{"unstructured":"Westin, A.F.: Privacy and freedom London. The Bodley Head (1970)","key":"25_CR21"},{"issue":"3","key":"25_CR22","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1016\/j.chb.2011.12.008","volume":"28","author":"KW Wu","year":"2012","unstructured":"Wu, K.W., Huang, S.Y., Yen, D.C., Popova, I.: The effect of online privacy policy on consumer privacy concern and trust. Comput. Hum. Behav. 28(3), 889\u2013897 (2012)","journal-title":"Comput. Hum. Behav."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:29:30Z","timestamp":1751495370000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}