{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,13]],"date-time":"2025-07-13T22:40:03Z","timestamp":1752446403686,"version":"3.41.2"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030812416"},{"type":"electronic","value":"9783030812423"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-81242-3_15","type":"book-chapter","created":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T03:04:02Z","timestamp":1626231842000},"page":"259-277","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Rewarding Framework for\u00a0Crowdsourcing to Increase Privacy\u00a0Awareness"],"prefix":"10.1007","author":[{"given":"Ioannis","family":"Chrysakis","sequence":"first","affiliation":[]},{"given":"Giorgos","family":"Flouris","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Makridaki","sequence":"additional","affiliation":[]},{"given":"Theodore","family":"Patkos","sequence":"additional","affiliation":[]},{"given":"Yannis","family":"Roussakis","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Samaritakis","sequence":"additional","affiliation":[]},{"given":"Nikoleta","family":"Tsampanaki","sequence":"additional","affiliation":[]},{"given":"Elias","family":"Tzortzakakis","sequence":"additional","affiliation":[]},{"given":"Elisjana","family":"Ymeralli","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Seymoens","sequence":"additional","affiliation":[]},{"given":"Anastasia","family":"Dimou","sequence":"additional","affiliation":[]},{"given":"Ruben","family":"Verborgh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,14]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"Amini, S., Lin, J., Hong, J.I., Lindqvist, J., Zhang, J.: Mobile application evaluation using automation and crowdsourcing (2018). https:\/\/doi.org\/10.1184\/R1\/6470255.v1","DOI":"10.1184\/R1\/6470255.v1"},{"key":"15_CR2","unstructured":"Amini, S.: Analyzing mobile app privacy using computation and crowdsourcing. Ph.D. thesis, Carnegie Mellon University (2014)"},{"issue":"4","key":"15_CR3","first-page":"440","volume":"11","author":"MJ Antikainen","year":"2010","unstructured":"Antikainen, M.J., Vaataja, H.K.: Rewarding in open innovation communities-how to motivate members. Int. J. Entrepre. Innov. Manag. 11(4), 440\u2013456 (2010)","journal-title":"Int. J. Entrepre. Innov. Manag."},{"issue":"2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MSECP.2004.1281243","volume":"2","author":"AI Ant\u00f3n","year":"2004","unstructured":"Ant\u00f3n, A.I., Earp, J.B., He, Q., Stufflebeam, W., Bolchini, D., Jensen, C.: Financial privacy policies and the need for standardization. IEEE Secur. Privacy 2(2), 36\u201345 (2004)","journal-title":"IEEE Secur. Privacy"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Bergmann, M.: Testing privacy awareness. In: IFIP Summer School on the Future of Identity in the Information Society, pp. 237\u2013253 (2008)","DOI":"10.1007\/978-3-642-03315-5_18"},{"key":"15_CR6","unstructured":"Bergram, K., Bezen\u00e7on, V., Maingot, P., Gjerlufsen, T., Holzer, A.: Digital nudges for privacy awareness: from consent to informed consent? In: ECIS (2020)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Bhatia, J., Breaux, T.D., Schaub, F.: Mining privacy goals from privacy policies using hybridized task recomposition. ACM TOSEM 25(3), 1\u201324 (2016)","DOI":"10.1145\/2907942"},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"Chrysakis, I.: CAP-A rewarding framework evaluation - list of questions (2020). https:\/\/doi.org\/10.6084\/m9.figshare.13042772.v8","DOI":"10.6084\/m9.figshare.13042772.v8"},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"Chrysakis, I.: Introduction to CAP-A portal & rewarding evaluation scenario (2020). https:\/\/doi.org\/10.6084\/m9.figshare.13042787.v5","DOI":"10.6084\/m9.figshare.13042787.v5"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-030-62327-2_10","volume-title":"The Semantic Web: ESWC 2020 Satellite Events","author":"I Chrysakis","year":"2020","unstructured":"Chrysakis, I., Flouris, G., Patkos, T., Dimou, A., Verborgh, R.: REWARD: ontology for reward schemes. In: Harth, A., et al. (eds.) ESWC 2020. LNCS, vol. 12124, pp. 56\u201360. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62327-2_10"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Chrysakis, I., et al.: CAP-A: a suite of tools for data privacy evaluation of mobile applications. In: JURIX (2020)","DOI":"10.3233\/FAIA200881"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Chrysakis, I., et al.: Evaluating the data privacy of mobile applications through crowdsourcing. In: JURIX (2020)","DOI":"10.3233\/FAIA200868"},{"key":"15_CR13","unstructured":"Craig, T., Ludloff, M.E.: Privacy and Big Data: The Players, Regulators, and Stakeholders. O\u2019Reilly Media, Inc., Sebastopol (2011)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Diamantopoulou, V., Androutsopoulou, A., Gritzalis, S., Charalabidis, Y.: An assessment of privacy preservation in crowdsourcing approaches: towards GDPR compliance. In: RCIS, pp. 1\u20139. IEEE (2018)","DOI":"10.1109\/RCIS.2018.8406643"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Fatima, R., Yasin, A., Liu, L., Wang, J., Afzal, W., Yasin, A.: Sharing information online rationally: An observation of user privacy concerns and awareness using serious game. J. Inf. Secur. Appl. 48, 102351 (2019)","DOI":"10.1016\/j.jisa.2019.06.007"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Finnerty, A., Kucherbaev, P., Tranquillini, S., Convertino, G.: Keep it simple: reward and task design in crowdsourcing. In: CHItaly (2013)","DOI":"10.1145\/2499149.2499168"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Flouris, G., et al.: Towards a collective awareness platform for privacy concerns and expectations. In: ODBASE (2018)","DOI":"10.1007\/978-3-030-02610-3_8"},{"key":"15_CR18","unstructured":"Grobbink, E., Peach, K.: Combining crowds and machines (2020), https:\/\/www.nesta.org.uk\/report\/combining-crowds-and-machines\/"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Hatamian, M., Kitkowska, A., Korunovska, J., Kirrane, S.: \u2018It\u2019s shocking!\u2019: analysing the impact and reactions to the A3: android apps behaviour analyser. In: DBSec, pp. 198\u2013215 (2018)","DOI":"10.1007\/978-3-319-95729-6_13"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-29615-4_10","volume-title":"Information Security Technology for Applications","author":"E Kani-Zabihi","year":"2012","unstructured":"Kani-Zabihi, E., Helmhout, M.: Increasing service users\u2019 privacy awareness by introducing on-line interactive privacy features. In: Laud, P. (ed.) NordSec 2011. LNCS, vol. 7161, pp. 131\u2013148. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29615-4_10"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Kavaliova, M., Virjee, F., Maehle, N., Kleppe, I.A.: Crowdsourcing innovation and product development: gamification as a motivational driver. Cogent Bus. Manag. 3(1), 1128132 (2016)","DOI":"10.1080\/23311975.2015.1128132"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122\u2013134 (2017)","DOI":"10.1016\/j.cose.2015.07.002"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, S., Ou, S., Tripathi, A.K.: Acceptance of monetary rewards in open source software development. Res. Policy 43(4), 632\u2013644 (2014)","DOI":"10.1016\/j.respol.2013.10.007"},{"key":"15_CR24","unstructured":"Lee, T.Y., et al.: Experiments on motivational feedback for crowdsourced workers. In: $$7^{th}$$ AAAI Conference on Weblogs and Social Media (2013)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Liang, F., Yu, W., An, D., Yang, Q., Fu, X., Zhao, W.: A survey on big data market: pricing, trading and protection. IEEE Access 6, 15132\u201315154 (2018)","DOI":"10.1109\/ACCESS.2018.2806881"},{"issue":"1","key":"15_CR26","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1177\/1938965509355395","volume":"51","author":"M McCall","year":"2010","unstructured":"McCall, M., Voorhees, C.: The drivers of loyalty program success: an organizing framework and research agenda. Cornell Hosp. Q. 51(1), 35\u201352 (2010)","journal-title":"Cornell Hosp. Q."},{"key":"15_CR27","unstructured":"McGonigal, J.: Reality Is Broken: Why Games Make Us Better and Bow They Can Change the World, Penguin, New York (2011)"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Morschheuser, B., Hamari, J., Koivisto, J.: Gamification in crowdsourcing: a review. In: $$49^{th}$$ Hawaii International Conference on System Sciences (2016)","DOI":"10.1109\/HICSS.2016.543"},{"key":"15_CR29","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.ijhcs.2017.04.005","volume":"106","author":"B Morschheuser","year":"2017","unstructured":"Morschheuser, B., Hamari, J., Koivisto, J., Maedche, A.: Gamified crowdsourcing: conceptualization, literature review, and future agenda. Int. J. Hum. Comput. Stud. 106, 26\u201343 (2017)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Nejad, N.M., Scerri, S., Lehmann, J.: KnIGHT: mapping privacy policies to GDPR. In: European Knowledge Acquisition Workshop, pp. 258\u2013272 (2018)","DOI":"10.1007\/978-3-030-03667-6_17"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Newman, G., Wiggins, A., Crall, A., Graham, E., Newman, S., Crowston, K.: The future of citizen science: emerging technologies and shifting paradigms. Front. Ecol. Environ. 10(6), 298\u2013304 (2012)","DOI":"10.1890\/110294"},{"issue":"2","key":"15_CR32","doi-asserted-by":"publisher","first-page":"185","DOI":"10.3233\/SW-170283","volume":"9","author":"A Oltramari","year":"2018","unstructured":"Oltramari, A., Piraviperumal, D., Schaub, F., Wilson, S., Cherivirala, S., Norton, T.B., Russell, N.C., Story, P., Reidenberg, J., Sadeh, N.: Privonto: a semantic framework for the analysis of privacy policies. Seman. Web 9(2), 185\u2013203 (2018)","journal-title":"Seman. Web"},{"key":"15_CR33","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-03315-5_17","volume-title":"The Future of Identity in the Information Society","author":"S P\u00f6tzsch","year":"2009","unstructured":"P\u00f6tzsch, S.: Privacy awareness: a means to solve the privacy paradox? In: Maty\u00e1\u0161, V., Fischer-H\u00fcbner, S., Cvr\u010dek, D., \u0160venda, P. (eds.) Privacy and Identity 2008. IAICT, vol. 298, pp. 226\u2013236. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03315-5_17"},{"issue":"3","key":"15_CR34","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1509\/jmkg.75.3.99","volume":"75","author":"SA Samaha","year":"2011","unstructured":"Samaha, S.A., Palmatier, R.W., Dant, R.P.: Poisoning relationships: perceived unfairness in channels of distribution. J. Market. 75(3), 99\u2013117 (2011)","journal-title":"J. Market."},{"issue":"6","key":"15_CR35","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/2461256.2461275","volume":"56","author":"O Scekic","year":"2013","unstructured":"Scekic, O., Truong, H.L., Dustdar, S.: Incentives and rewarding in social computing. Commun. ACM 56(6), 72\u201382 (2013)","journal-title":"Commun. ACM"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Solove, D.J.: The myth of the privacy paradox. Available at SSRN (2020)","DOI":"10.2139\/ssrn.3536265"},{"key":"15_CR37","unstructured":"Vroom, V.H.: Work and Motivation. Wiley, New York (1964)"},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Wilson, S., et al.: Crowdsourcing annotations for websites\u2019 privacy policies: can it really work? In: Proceedings of WWW-16, pp. 133\u2013143 (2016)","DOI":"10.1145\/2872427.2883035"},{"key":"15_CR39","unstructured":"Xu, H., Dinev, T., Smith, H.J., Hart, P.J.: Examining the formation of individual\u2019s privacy concerns: toward an integrative view. In: ICIS (2008)"},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"Yang, D., Xue, G., Fang, X., Tang, J.: Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing. In: MobiCom (2012)","DOI":"10.1145\/2348543.2348567"},{"key":"15_CR41","unstructured":"Zichermann, G., Cunningham, C.: Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps. O\u2019Reilly Media, Inc., Sebastopol (2011)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-81242-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,13]],"date-time":"2025-07-13T22:03:21Z","timestamp":1752444201000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-81242-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030812416","9783030812423"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-81242-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"14 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Calgary, AB","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}